US20190302861A1 - Protocol level control for system on a chip (soc) agent reset and power management - Google Patents
Protocol level control for system on a chip (soc) agent reset and power management Download PDFInfo
- Publication number
- US20190302861A1 US20190302861A1 US16/368,418 US201916368418A US2019302861A1 US 20190302861 A1 US20190302861 A1 US 20190302861A1 US 201916368418 A US201916368418 A US 201916368418A US 2019302861 A1 US2019302861 A1 US 2019302861A1
- Authority
- US
- United States
- Prior art keywords
- agent
- soc
- interconnect
- transaction
- agents
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/24—Resetting means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
- G06F1/3209—Monitoring remote activity, e.g. over telephone lines or network connections
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/324—Power saving characterised by the action undertaken by lowering clock frequency
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/3243—Power saving in microcontroller unit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/3296—Power saving characterised by the action undertaken by lowering the supply or operating voltage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/76—Architectures of general purpose stored program computers
- G06F15/78—Architectures of general purpose stored program computers comprising a single central processing unit
- G06F15/7807—System on chip, i.e. computer system on a single chip; System in package, i.e. computer system on one or more chips in a single package
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
- G06N5/043—Distributed expert systems; Blackboards
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
Definitions
- the present application is directed to a System on a Chip (SoC), and more particularly, to a system and method for consistently implementing reset and/or power management functionality on SoC, which in turn, provides a more uniform system software view of SoCs, particularly across families of SoCs.
- SoC System on a Chip
- SoC System on a Chip
- IP agents are typically “reusable” blocks of circuitry designed to implement or perform a specific function. By using IP agents, the time and cost of developing complex SoCs can be significantly reduced.
- SoCs typically include a system controller and an interconnect, such as a bus or Network on a Chip (NoC).
- the system controller runs system software and is provided to manage the overall operation of the SoC.
- the various IP agents are connected to the interconnect via one or more links and communicate with one another via the interconnect.
- SoC developers commonly use disparate IP agents, often from multiple vendors. Each IP agent will ordinarily implement its own unique procedures for reset. From the perspective of the system controller and the interconnect on the SoC, this is problematic for several reasons.
- a typical SoC will normally have multiple IP agents connected to the interconnect. Upon reset, each of the IP agents will likely emerge from the reset state at different times due to the unique reset procedures each uses. The different times each IP agent emerges from reset can cause significant problems. If a source IP agent generates a transaction for a destination IP agent that is still in reset, then the (1) destination IP agent is unable to process the request and (2) source IP agent never receives a reply. As a result, the entire system may get hung up, possibly requiring a system-wide reset.
- the intermediate circuitry from one SoC to another, is typically developed by different design teams. As a result, the intermediate circuitry is usually different from one SoC to the next, or even between different sub-systems on the same SoC.
- the complexity of the circuitry normally means the number of IP agents that can be connected to a given interconnect is limited. The practical effect of this restriction is that more interconnect levels are needed to accommodate a given number of IP agents. The overall complexity of the SoC is therefore increased.
- IP agents malfunction. For example, IP agents may inject spurious transactions onto the interconnect, may fail to respond to a received transaction, generate an exception message, etc. In certain situations, the malfunctioning IP agent may need to be reset. With current SoC interconnect standards, there is no standardized IP agent reset mechanism. Either the entire SoC has to be reset, or intermediary circuitry needs to be designed to perform the necessary isolation, reset, and re-introduction of the IP to the system, etc.
- ABA Advanced Microcontroller Bus Architecture
- SoCs SoCs that are similar
- the software typically cannot simply be ported from one device to another, even in situations where the IP agents may be the same. If there are minor differences in any intermediate circuitry used for reset and/or power management, the system software may need to be modified and debugged for each device.
- a system for consistently implementing reset and power management of IP agents on SoCs, removing the need for customization, and which leads to a consistent system software view among multiple SoCs, is disclosed.
- the system includes one or more IP agents, an interconnect and one or more links between the IP agents and the interconnect respectively.
- IP agents undergo a reset
- an individual negotiation takes place between the interconnect and each IP agent over the link.
- each IP agent can emerge from reset at its own time schedule, independently of the timing of the other IP agents.
- each IP agent Upon emerging from reset, each IP agent becomes “transaction ready” and is introduced to the interconnect, becoming visible to other elements connected to the interconnect, such as the system controller.
- the interconnect may be configured as a proxy for any IP agent that is inoperable. This feature is beneficial because it prevents system wide hang ups that may otherwise occur when an IP agent is targeted with a transaction (1) prior to being transaction ready, (2) malfunctioning and/or (3) inoperable when in a powered down state. With the interconnect acting as a proxy, an exception message can be sent to the source sending the transaction, preventing a hang up caused by the source waiting indefinitely for a response from the target IP agent.
- the ability to arrange for the interconnect to act as a proxy for an IP agent enables (1) IP agents to be individually reset and (2) IP agents to be placed in a power saving state.
- the power saving state can include one of several modes, including a low power, operational mode, a low power inoperable mode with state information either maintained or not retained, or a power off mode.
- the present invention thus solves a number of issues. It eliminates the need to create custom circuitry for (1) managing each IP agent to emerge from reset during the same time/clock cycle and (2) power management of IP agents. Instead, the present invention advantageously provides a uniform implementation for both these functions, which leads to a consistent system software view among multiple SoCs. With this consistent software view, much of the custom design and software modifications across families of SoCs is eliminated, saving development costs, reducing complexity, and providing a quicker time to market.
- FIG. 1 is a block diagram of a shared interconnect for a System on a Chip (SoC) in accordance with a non-exclusive embodiment.
- SoC System on a Chip
- FIG. 2 is an exemplary packet of a transaction in accordance with a non-exclusive embodiment.
- FIG. 3A is a logic diagram illustrating an arbitration element in accordance with a first non-exclusive embodiments.
- FIG. 3B is a logic diagram illustrating an arbitration element in accordance with a second non-exclusive embodiment.
- FIG. 4 is a flow diagram illustrating operational steps for arbitrating and sending portion(s) of transactions over virtual channels of the shared interconnect in accordance with a non-exclusive embodiment.
- FIG. 5 illustrates a first example of the interleaving the transmission of portions of different transactions over virtual channels of the shared interconnect in accordance with a non-exclusive embodiment.
- FIG. 6 illustrates a second example of the interleaving the transmission of portions of different transactions over virtual channels of the shared interconnect in accordance with a non-exclusive embodiment.
- FIG. 7 illustrates is a block diagram of two shared interconnects for handling traffic in two directions in accordance with another non-exclusive embodiment of the invention.
- FIG. 8 illustrates a block diagram of an SoC having reset, power management and quiesce functionality in accordance with a non-exclusive embodiment of the invention.
- FIG. 9 is a flow diagram showing an IP agent reset sequence in accordance with a non-exclusive embodiment of the invention.
- FIG. 10 is a flow diagram showing a reset sequence for a malfunctioning IP agent in accordance with a non-exclusive embodiment of the invention.
- FIG. 11 is a flow diagram illustrating a power down/up sequence for an IP agent in accordance with a non-exclusive embodiment of the invention.
- FIG. 12 is a flow diagram illustrating a power down/up sequence for an IP agent in accordance with a non-exclusive embodiment of the invention.
- FIG. 13 is a flow diagram illustrating a power down/up sequence for an IP agent in accordance with a yet another non-exclusive embodiment of the invention.
- FIG. 14 is a flow chart illustrating the steps for placing a link in a quiescent state.
- FIG. 15A-15D are flow diagrams illustrating various “wake-up” sequences for an IP agent.
- SoCs System on a Chip
- consumer devices e.g., handheld, mobile phones, tablet computers, laptop and desktop computers, media processing etc.
- virtual or augmented reality e.g., robotics, autonomous vehicles, aviation, etc.
- medical instrumentation e.g., imaging, etc.
- industrial, home automation e.g., smart appliances, home surveillance, etc.
- data center applications e.g., network switches, attached storage devices, etc.
- the present application is broadly directed to an arbitration system and method for arbitrating access to a shared resource.
- a shared resource can be, for example, a bus interconnect, a memory resource, a processing resource, or just about any other resource that is shared among multiple vying parties.
- the shared resources as described in detail below is an interconnect that is shared by a plurality of sub-systems on a System on a Chip or “SoC”.
- the shared resource is a physical interconnect
- various transactions, or portions thereof are transmitted over a multiplicity of virtual channels associated with the shared interconnect and one of a number of different arbitration schemes and/or priorities may be used to arbitrate access to the shared interconnect for the transmission of transactions between the sub-functions.
- Non-posted A transaction that requires a response transaction from the destination agent (e.g., a read or a write operation)
- Completion A response transaction for a non-posted transaction.
- a Posted transaction such as a write, requires no response transaction. Once a source writes data to a designated destination, the transaction is finished. With a Non-posted transaction, such as either a read or a write, a response is required. However, the response is bifurcated as a separate Completion transaction. In other words with a read, a first transaction is used for the read operation, while a separate, but related, Completion transaction is used for returning the read contents. With a Non-posted write, a first transaction is used for the write, while a second related Completion transaction is required for the confirmation once the write is complete.
- Transactions can be represented by one or more packets.
- a transaction may be represented by a single packet.
- multiple packets may be needed to represent the entire transaction.
- a beat is the amount of data that can be transmitted over the shared interconnect per clock cycle. For example if the shared interconnect is physically 128 bits wide, then 128 bits can be transmitted each beat or clock cycle.
- a transaction may need to be divided into multiple portions for transmission.
- a transaction is only a single packet that is 128 bits wide or less, then the entire transaction can be sent in one clock cycle or beat. If the same transaction happens to include additional packets, then additional clock cycles or beats may be needed.
- portion of a transaction is therefore the amount of data that can be transferred over the shared interconnect during a given clock cycle or beat.
- the size of a portion may vary depending on the physical width of the shared interconnect. For instance, if the shared interconnect is physically 64 data bits wide, then the maximum number of bits that can be transferred during any one cycle or beat is 64 bits. If a given transaction has a payload of 64 bits or less, then the entire transaction can be sent over the shared interconnect in a single portion. On the other hand if the payload is larger, then the packet has to be sent over the shared interconnect in multiple portions. A transaction with a payload of 128, 256 or 512 bits requires two (2), four (4) and eight (8) portions respectively. As such, the term “portion” or “portions” should therefore be broadly construed to mean either part of or an entire transaction that may be sent over the share interconnect during any given clock cycle or beat.
- a stream is defined as the pairing of a virtual channel and a transaction class. For instance, if there are four (4) virtual channels (e.g., VC 0 , VC 1 , VC 2 and VC 3 ) and three (3) transaction classes (P, NP, C), then there are a maximum of twelve (12) different possible streams.
- virtual channels e.g., VC 0 , VC 1 , VC 2 and VC 3
- P, NP, C transaction classes
- FIG. 1 a block diagram of an arbitration system 10 is shown.
- the arbitration system is used for arbitrating access by a number of sub-functions 14 (i.e., IP 1 , IP 2 and IP 3 ) to a shared interconnect 12 attempting to send transactions to upstream sub-functions 14 (i.e., IP 4 , IP 5 and IP 6 ).
- sub-functions 14 i.e., IP 1 , IP 2 and IP 3
- upstream sub-functions 14 i.e., IP 4 , IP 5 and IP 6 .
- the shared interconnect 12 is a physical interconnect that is N data bits wide and includes M control bits.
- the shared interconnect 12 is also one-directional, meaning it handles traffic only from a source (i.e., IP 1 , IP 2 and IP 3 ) to a destination (i.e., IP 4 , IP 5 and IP 6 ).
- the number of N data bits can be any integer, but typically is some power of the number 2 (e.g., 2 1 , 2 2 , 2 3 , 2 4 , 2 5 , 2 6 , 2 7 , 2 8 2 9 etc.) or (2, 4, 6, 8, 16, 32, 64, 128, 256 etc.) bits wide respectively.
- the number of N bits is either 32, 64, 128, 256 or even 512.
- these widths are merely illustrative and should not be construed as limiting in any manner.
- control bits M may also vary and be any number.
- One or more logical channels are associated with the shared interconnect 12 .
- Each virtual channel is independent.
- Each virtual channel may be associated with multiple independent streams.
- the number of virtual channels may widely vary. For example, up to thirty-two (32) or more virtual channels may be defined or associated with the shared interconnect 12 .
- each virtual channel may be assigned a different priority.
- One or more virtual channel(s) may be assigned a higher priority, while one or more other virtual channel(s) may be assigned a lower priority.
- the higher priority channels are awarded or arbitrated access to the shared interconnect 12 over the lower priority virtual channels.
- each of the virtual channels may be given the same priority, in which case, no preference is given to one virtual channel versus another when awarding or arbitrating access to shared interconnect 12 .
- the priority assigned to one or more of the virtual channels may also dynamically change.
- all the virtual channels may be assigned the same priority, but in a second set of circumstances, certain virtual channel(s) can be assigned a higher priority than other virtual channel(s).
- the priority scheme used among the virtual channels can be varied to best meet current operating conditions.
- Each of the sub-systems 14 is typically a block of “reusable” circuitry or logic, commonly referred to as an IP core or agent.
- IP agents are designed to perform a specific function, for example, controllers for peripheral devices such as an Ethernet port, a display driver, an SDRAM interface, a USB port, etc.
- IP agents are generally used as “building blocks” that provide needed sub-system functionality within the overall design of a complex system provided on an integrated circuit (IC), such as either an Application Specific Integrated Circuit (ASIC) or a Field Programmable Gate Array (FPGA).
- ASIC Application Specific Integrated Circuit
- FPGA Field Programmable Gate Array
- sub-system agents 14 are described above in terms of a dedicated IP core, it should be understood that this is not a necessary requirement. On the contrary, a sub-system 14 can also be a collection of IP functions connected to or sharing a single port 20 . Accordingly, the term “agent” should be broadly construed as any type of sub-system connected to a port 20 , regardless if the sub-system performs a single function or multiple functions.
- a pair of switches 16 and 18 provides access between each of the sub-system agents 14 and the shared interconnect 12 via dedicated access ports 20 respectively.
- the sub-system agents IP 1 , IP 2 , and IP 3 connect with switch 16 via access Port 0, Port 1 and Port 2 respectively.
- IP 4 , IP 5 , and IP 6 connect with switch 18 via Port 3, Port 4 and Port 5 respectively.
- an access port 22 via the interconnect 12 , provides sub-system agents IP 4 , IP 5 , and IP 6 access to switch 16 in the aggregate.
- the switches 16 and 18 perform multiplexing and de-multiplexing functions.
- Switch 16 selects up-stream traffic generated by the sub-system agents IP 1 , IP 2 , and/or IP 3 and sends the traffic downstream over the shared interconnect 12 .
- a de-multiplexing operation is performed and the traffic is provided to a target sub-system agent (i.e., either IP 4 , IP 5 , or IP 6 ).
- Each access port 20 has a unique port identifier (ID) and provides each sub-system agent 14 dedicated access to either switch 16 or 18 .
- ID port identifier
- sub-system agents IP 1 , IP 2 and IP 3 are assigned to access ports Port 0, Port 1 and Port 2 respectively.
- the sub-system agents IP 4 , IP 5 and IP 6 are assigned access ports Port 3, Port 4 and Port 5 respectively.
- the unique port IDs 20 are used for addressing traffic between the sub-system agents 14 .
- Each Port 20 has a certain amount of allocated addressable space in system memory 24 .
- all or some of the access ports 20 can also be assigned a “global” port identifier as well their unique port ID. Transactions and other traffic can be sent to all or some of the access ports assigned to the global port identifier. Accordingly, with the global identifier, transactions and other traffic can be widely disseminated or broadcast to all or some of the access ports 20 , obviating the need to individually address each access port 20 using its unique identifier.
- the switch 16 also includes an arbitration element 26 , Address Resolution Logic (ARL) 28 and an address resolution Look Up Table (LUT) 30 .
- ARL Address Resolution Logic
- LUT address resolution Look Up Table
- the sub-system agents IP 1 , IP 2 and IP 3 generate transactions. As each transaction is generated, it is packetized by the originating sub-system agent 14 and then the packetized transaction is injected via the corresponding port 20 into a local switch 16 . For instance, portions of transactions generated by IP 1 , IP 2 and IP 3 are provided to switch 16 by via ports Port 0, Port 1 and Port 2 respectively.
- the ports 20 each include a number of first-in, first-out buffers (not illustrated) for each of the virtual channels associated with the interconnect channel 12 respectively.
- each port 20 includes four buffers, one for each virtual channel.
- the number of virtual channels and buffers contained in the ports 20 may vary and is not limited to four. On the contrary, the number of virtual channels and buffers may be more or less than four.
- a given transaction is represented by two (or more) portions, those portions are maintained in the same buffer. For instance, if interconnect 12 is 128 data bits wide and a transaction is represented by a packet containing a payload of 512 bits, then the transaction needs to be segmented into four (4) portions that are transmitted over four clock cycles or beats. On the other hand if the transaction can be represented by a single packet having a payload of 64 bits, then the single portion can be transmitted in one clock cycle or beat.
- the virtual channels remain logically independent. In other words, all the traffic associated with a given transaction is always sent over the same virtual channel as a stream and is not bifurcated over multiple virtual channels.
- the arbitration element 26 is responsible for arbitrating among the competing buffered portions of transactions maintained by the various access ports 20 .
- the arbitration element 26 performs an arbitration every clock cycle, provided multiple competing transactions are available.
- the arbitration winner per cycle yields a portion of a transaction, from one of the sub-systems IP 1 , IP 2 and IP 3 , that is granted access to and is transmitted over the interconnect 12 .
- the source sub-system IP 1 , IP 2 and IP 3 ordinarily knows the address in the address space for the possible destination sub-system agents IP 4 , IP 5 and IP 6 , but does not know the information (e.g., the Port IDs 20 and/or 22 ) needed to route the transactions to their destinations.
- the local Address Resolution Logic (ARL) 28 is used for resolving the known destination address into the needed routing information.
- a source sub-agent 14 may simply know that it wishes to access a given address in system memory 24 .
- the ARL 28 is therefore tasked to access the LUT 30 and performs an address look up of the port(s) 20 / 22 along the delivery path to the final destination corresponding to the specified address.
- SBR Source Based Routing
- not all the nodes within the interconnect require an ARL 28 and LUT 30 .
- transactions without needed routing information can be forwarded to a default node.
- an ARL 28 and LUT 30 are accessed and the needed routing information can then be inserted into the headers of the packet(s) of transactions.
- the default node is typically upstream from the node without the ARL 28 and LUT 30 . However, this is by no means a requirement.
- the default node, or nodes can be located anywhere on the SoC.
- the ARL 28 may also be referred to as an “ordering point” because, besides decoding the forwarding destination for winning portion(s) of transactions, it defines a sequence order for the winning portion(s) of transactions within each virtual channel. As each arbitration is resolved, regardless of whether or not the ARL 28 is used to perform an address port lookup, the winning portions of transactions are inserted into a first-in, first out queue provided for each virtual channel. The winning portions of transactions then await their turn for transmission over the interconnect 12 in the buffer.
- the ARL 28 is also used for defining “upstream” and downstream” traffic. In other words any transactions generated by the IP agents 14 associated with switch 16 (i.e., IP 1 , IP 2 and IP 3 ) is considered upstream with respect to the ARL 28 . All transaction post the ARL 28 (i.e., transmitted to IP 4 , IP 5 and IP 6 ) is considered downstream traffic.
- the IP agents 14 associated with switch 16 may communicate and send transactions to one another, either directly or indirectly.
- direct communication often referred to as Source Based Routing (SBR)
- the IP agents 14 can send transactions to one another in a peer-to-peer model.
- the source IP agent knows the unique Port ID of its peer IP agents 14 , bypassing the need to use the ARL 28 to access the LUT 30 .
- the transactions between the IP agents associated with the switch 16 can be routed using the ARL 28 .
- the source IP agent only knows the address of the destination IP agent 14 , but not the information needed for routing.
- the ARL 28 is then used to access the LUT 30 , find the corresponding Port ID, which is then inserted into the destination field of the packet(s) of the transaction.
- the IP agents 14 create and process transactions over virtual channels associated with the interconnect 12 .
- Each transaction typically is made up of one or more packets.
- Each Packet typically has a fixed header size and format. In some instances, each packet may have a fixed sized payload. In other instances, packet payloads may vary in size, from large too small, or even with no payload at all.
- the packet 32 includes a header 34 and a payload 36 .
- the header 34 is sixteen (16) Bytes in size. It should be understood that this size is exemplary and either a larger size (e.g., more Bytes) or smaller size (e.g., fewer Bytes) packets may be used. It should also be understood that headers 34 of packets 32 do not necessarily have to all be the same size. In alternative embodiments, the size of packet headers in a SoC may be variable.
- the header 34 includes a number of fields including a destination identifier (DST_ID), a source identifier (SRC_ID), a payload size indicator (PLD_SZ), a reserved field (RSVD), a command field (CMD), a TAG field, a status (STS), a transaction ID field (TAG), an address or ADDR field, a USDR/Compact payload field, a transaction Class or TC field, a format FMT filed, and a Byte Enable (BE) field.
- DST_ID destination identifier
- SRC_ID source identifier
- PLD_SZ payload size indicator
- RSVD reserved field
- CMD command field
- TAG TAG
- STS status
- TAG transaction ID field
- ADDR field address or ADDR field
- USDR/Compact payload field a USDR/Compact payload field
- a transaction Class or TC field a format FMT filed
- BE Byte Enable
- DST Specifies the corresponding Port ID for the targeted IP agent 14.
- SRC Specifies the Port ID for the sending IP agent 14.
- PLD_SZ Specifies the size of the payload of the packet.
- CMD Specifies the type of transaction/command the packet contains. Exemplary commands may include Incremental Read, Incremental Write, Compact Read, Compact Write, Write to FIFO, Destructive Incremental Read, Wrap, etc.
- TAG Specifies a transaction ID for the packet. Transactions IDs are used for matching Non-posted transactions and their corresponding Completion transactions. When a Completion transaction including a matching transaction ID in the TAG field is received, the corresponding Non-posted read or write operation is complete.
- ADDR Specifies the physical address in system memory 24 of the request USRD/ If the payload of the packet is sufficiently small, it can be Compact transported in this field in the header, not the payload. This payload field can also be used to transport a private or secure message between the source and the destination IP ports. STS This field is valid only with Completion packets. Specifies the status of the corresponding Non-posted transaction, (i.e., either a successful completion or a failed transaction). RSVD This is a reserved field that can also be used to transport a private or secure message between the source and the destination IP ports. FMT Specifies the format specification if multiple header formats are defined and used. BE Byte Enable, indicates which bytes in the payload are valid.
- the payload 36 contains the contents of the packet.
- the size of the payload may vary. In some instances, the payload may be large. In other instances, it could be small. In yet other instances, if the content is very small or “compact”, it can be transported in the USRD field of the header 34 .
- the type of transaction will often dictate whether or not the packet(s) used to represent the transaction has/have payloads or not. For example with either a Posted or Non-posted read, the packet(s) will designate the location address to be accessed, but will typically have no payload. The packets for the related Completion transaction, however, will include payload(s) containing the read content. With both Posted and Non-posted write transactions, the packet(s) will include a payload containing the data to be written to the destination. With Non-posted versions of a write, the packets for the Completion transaction will ordinarily not defined a payload. However, in some situations, a Completion transaction will define a payload.
- the exemplary packet and above description covers many of basic fields that may be included in a packet. It should be understood that additional fields may be deleted or added. For instance, a private signaling field may be used so a source and a destination may share private messages.
- FIG. 3A a logic diagram illustrating the arbitration logic performed by the arbitration element 26 with Peripheral Component Interconnect (PCI) ordering is shown.
- PCI Peripheral Component Interconnect
- each Port 20 includes separate buffers for each virtual channel and transaction class (P, NP and C) combination. For instance, with four virtual channels (VC 0 , VC 1 , VC 2 and VC 3 ), the Ports 0, Port 1 and Port 2 each have twelve first-in, first-out buffers. In other words for each Port 20 , a buffer is provided for each transaction class (P, NP, and C) and virtual channel (VC 0 , VC 1 , VC 2 and VC 30 combination.
- each IP agent 14 e.g., IP 1 , IP 2 and IP 3
- the resulting packets are placed in the appropriate buffer, based on transaction type, in the corresponding port (e.g., Port 0, Port 1 and Port 2) respectively.
- Non-posted (NP) and Completion (C) transactions generated by IP 1 are each placed in the Posted, Non-posted and Completion buffers for the assigned virtual channel in Port 0 respectively.
- Transactions generated by IP 2 and IP 3 are similarly placed in the Posted, Non-posted and Completion buffers for the assigned virtual channels in Ports 1 and Port 2 in a similar manner.
- packets can be assigned to a given virtual channel in a number of different ways. For instance, the assignment can be arbitrary. Alternatively, the assignment can be based on workload and the amount of outstanding traffic for each of the virtual channels. If one channel is very busy and the other not, then the port 20 will often attempt to balance the load and assign newly generated transaction traffic to under-utilized virtual channels. As a result, routing efficiency is improved. In yet other alternatives, transaction traffic can be assigned to a particular virtual channel based on urgency, security, or even a combination of both. If a certain virtual channel is given a higher priority and/or security than others, then high priority and/or secure traffic is assigned to the higher priority virtual channel.
- a port 20 can be hard-coded, meaning the port 20 has only one virtual channel and all traffic generated by that port 20 is transmitted over the one virtual channel. In yet other embodiments, the assignment can be based on the route chosen to reach the destination port 20
- the assignment of virtual channels can be implemented by the source IP agents 14 , either alone or in cooperation with its corresponding port 20 .
- a source IP agent 14 can generate a control signal to the corresponding port 20 requesting that packet(s) of a given transaction be assigned to a particular virtual channel.
- IP agents 14 can also make assignment decisions that are arbitrary, hard coded, based on balanced usage across all the virtual channels, security, urgency, etc., as discussed above.
- arbitration element 26 performs multiple arbitration steps per cycle. These arbitration steps include:
- the above order (1), (2) and (3) is not fixed. On the contrary, the above three steps may be completed in any order. Regardless of which order is used, a single arbitration winner is selected each cycle. The winning transaction is then transmitted over the corresponding virtual channel associated with the interconnect 12 .
- arbitration element 26 For each arbitration (1), (2) and (3) performed by arbitration element 26 , a number of arbitration schemes or rule sets may be used. Such arbitration schemes may include strict or absolute priority, a weighed priority where each of the four virtual channels is assigned a certain percentage of transaction traffic or a round-robin scheme where transactions are assigned to virtual channels in a predefined sequence order. In additional embodiments, other priority scheme such may be used. Also, it should be understood that the arbitration element 26 may dynamically switch among the different arbitration schemes from time-to-time and/or use the same or different arbitration schemes for each of the (1), (2) and (3) arbitrations respectively.
- availability of the destination ports 20 defined by the outstanding transaction(s) considered during a given arbitration cycle are considered. If a buffer in a destination port 20 does not have the resources available to process a given transaction, then the corresponding virtual channel is not available. As a result, the transaction in question does not compete in the arbitration, but rather, waits until a subsequent arbitration cycle when the target resource becomes available. On the other hand, when target resource(s) is/are available, the corresponding transaction(s) are arbitrated and compete for access to the interconnect 12 .
- the availability of the destination ports 20 may be checked at different times with respect to the multiple arbitration steps (1), (2) and (3) noted above. For instance, the availability check can be performed prior to the arbitration cycle (i.e., prior to completion of any of steps (1), (2) and (3)). As a result, only transactions that define available destination resources is/are considered during the subsequent arbitration. Alternatively, the availability check can be performed intermediate any of the three arbitration steps (1), (2) and (3), regardless of the order in which they are implemented.
- a number of rules are defined to arbitrate among competing portions of N, NP and C transactions. These rules include:
- Table IV below provides a summary of the PCI ordering rules. In the boxes with no (a) and (b) options, then the strict ordering rules need to be followed. In the boxes of the Table having (a) and (b) options, either strict order (a) or relaxed order (b) rules may be applied, depending on if the RO bit is reset or set respectively. In various alternative embodiments, the RO bit can be set or reset either globally or on individually on the packet level.
- the arbitration element 26 selects an ultimate winning transaction portion by performing, in no particular order, arbitrations among competing Ports 20 , virtual channels and transactions classes respectively.
- the winning portion per cycle gains access to the shared interconnect 12 and is transmitted over the corresponding virtual channel.
- FIG. 3B a logic diagram illustrating the arbitration logic performed by the arbitration element 26 with Device ordering is shown.
- the arbitration process, and possibly the consideration of available destination resources, is essentially the same as described above, except for two distinctions.
- each Port 20 (e.g., Port 0, Port 1 and Port 2) has a total of eight (8) buffers.
- the rules for selecting a Transaction for Device ordering are also different than PCI ordering.
- Device ordering there are no strict rules governing the selection of one class over the over class.
- either transaction class can be arbitrarily selected.
- common practice typically calls for favoring Completion transactions to free up resources that may not be available until a Completion transaction is resolved.
- the arbitration process for Device order is essentially the same as described above. In other words for each arbitration cycle, the arbitration steps (1), (2) and (3) are performed, in any particular order, to select an arbitration winner.
- the transaction class arbitration is performed, Device order rather than PCI order rules are used.
- the availability of destination resources and/or virtual channels may also be considered either prior to or intermediate any of the arbitration steps (1), (2) and (3).
- arbitration scheme can be used for sharing access to any shared resource and is not limited to use with just a shared interconnect.
- shared resources may include the ARL 28 , a processing resource, a memory resource such as the LUT 30 , or just about any other type of resource that is shared among multiple parties vying for access.
- FIG. 4 a flow diagram 40 illustrating operational steps for arbitrating access to a shared resource is shown.
- step 42 the various source sub-system agents 14 generate transactions.
- the transactions can be any of the three classes, including Posted (P), Non-posted (NP) and Completion (C).
- each of the transactions generated by the source sub-system agents 14 are packetized.
- packetization of a given transaction may result in one or multiple packets.
- the packets may also vary in size, with some packets having large payloads and others having small or no payloads.
- the transaction can be represented by a single portion.
- multiple portions are needed to represent the transaction.
- step 46 the portion(s) of the packetized transactions generated by each of the sub-system agents 14 are injected into the local switch 16 via its corresponding port 20 .
- the packet(s) of each transaction are assigned to a virtual channel.
- the assignment can be arbitrary, hard coded, based on balanced usage across all the virtual channels, security, urgency, etc.
- step 48 the portion(s) of the packetized transactions generated by each of the sub-system agents 14 are stored in the appropriate, first-in, first-out, buffer by both transaction class and by their assigned virtual channel (e.g., VC 0 , VC 1 , VC 2 and VC 3 ) respectively.
- virtual channels may be assigned by one of a number of different priority schemes, including strict or absolute priority, round-robin, weighted priority, least recently serviced, etc. If a given transaction has multiple portions, each portion will be stored in the same buffer. As a result, the multiple portions of a given transaction are transmitted over the same virtual channel associated with the interconnect 12 .
- the corresponding a counter for tracking the number content items in each buffer is decremented. If a particular buffer is filled, its counter is decremented to zero, meaning the buffer can no longer receive additional contents.
- first, second and third level arbitrations are performed.
- the selection of a Port 20 , a virtual channel and a transaction class can be performed in any order.
- Element 56 may be used to maintain the rules used to perform the first, second and third levels of arbitration. In each case, the element 56 is used as needed in resolving each of the arbitration levels. For instance, element 56 may maintain PCI and/or Device ordering rules. Element 56 may also contain rules for implementing several priority schemes, such as strict or absolute priority, weighted priority, round robin, etc., and the logic or intelligence for deciding which to use in a given arbitration cycle.
- step 58 a winner of the arbitration is determined.
- step 60 the winning portion is placed in a buffer used for accessing the shared resource and a counter associated with the buffer is decremented.
- step 62 the buffer associated with the winning portion is incremented since the winning portion is no longer in the buffer.
- step 64 the winning portion gains access to the shared resource. Once the access is complete, the buffer for the shared resource is incremented
- the steps 42 through 64 are continually repeated during successive clock cycles respectively. As different winning portions, each gains access to the shared resource.
- Transactions can be transmitted over the interconnect 12 in one of several modes.
- the header 34 of packet(s) 32 of a transaction are always transmitted first ahead of the payload 36 in separate portions or beats respectively.
- the 256 bits of the payload 36 are transmitted, while the remaining 256 bits of the interconnect 12 are not used.
- a significant percentage of the bandwidth of the interconnect is not used during the two beats.
- the degree of wasted bandwidth is reduced or possibly eliminated. For example with headers and/or payloads that are 384 or 512 bits, the amount of waste is either significantly reduced (e.g., with 384 bits) or eliminated altogether (e.g., with 512 bits).
- the header 34 of a packet is transmitted “on the side” of the data, meaning using the control bits M, while the payload 36 is transmitted over the N data bits of the interconnect 12 .
- the header information is transmitted over the control bits M along with or “on the side” of the data of the payload over the N data bits of the interconnect 12 .
- the header 34 of packets 32 are transmitted in line with the payload, but there is no requirement that the header 34 and the payload 36 must be transmitted in separate portions or beats. If a packet 32 has a header 34 that is 128 bits and a payload 36 that is 128 bits, then the total size is 256 bits (128+128). If the N data bits of interconnect 12 is 64, 128, 256 or 512 bits wide, then a packet of 256 bits is transmitted in 4, 2, 1 and 1 beats respectively. In another example, a packet 32 has a header of 128 bits and a payload 36 of 256 bits, or a total packet size of 384 bits (128+256). With the same interconnect 12 of N data bits of 64, 128, 256 or 512 wide, the packet is transmitted in 6, 3, 2, or 1 beats respectively. This mode will always be as least as efficient or more efficient as the header in-line mode described above.
- FIG. 5 a first example of the interleaving of portions of different transactions over multiple virtual channels is illustrated.
- the details of the two transactions include:
- T 1 Transaction 1
- T 1 B which was generated at Time T 1 and which is assigned to virtual channel VC 2 .
- the size of T 1 is four beats, designated as T 1 A, T 1 B, T 1 C and T 1 D;
- T 2 Transaction 2 (T 2 ), which was generated at Time T 2 (after Time T 1 ) is assigned to virtual channel VC 0 .
- the size of T 2 is a single portion or beat.
- VC 0 is assigned absolute or strict priority.
- the portions of the two transactions T 1 and T 2 are transmitted over the shared interconnect, as depicted in FIG. 5 , as follows:
- Cycle 1 Beat T 1 A of T 1 is transmitted over VC 2 because it is the only available transaction;
- Cycle 2 Beat T 1 B of T 1 and the single portion of T 2 are competing for access to the interconnect 12 . Since VCO has strict priority, T 2 automatically wins. Accordingly, the beat of T 2 is transmitted over VC 0 .
- Cycle 3 Since there are no competing transactions, beat T 1 B of T 1 is transmitted over VC 2 .
- Cycle 4 Since there are no competing transactions, beat T 1 C of T 1 is transmitted over VC 2 .
- Cycle 5 Since there are no competing transactions, beat T 1 D of T 1 is transmitted over VC 2 .
- This example illustrates (1) with a virtual channel with absolute priority, access to the shared interconnect 12 is immediately awarded whenever traffic becomes available, regardless of whether or not other traffic has been previously waiting and (2) the winning portions or beats of different transactions are interleaved and transmitted over different virtual channels associated with the interconnect 12 .
- virtual channel VCO was given absolute priority. It should be understood that with absolute or strict priority schemes, any of the virtual channels may be assigned the highest priority.
- FIG. 6 a second example of the interleaving of portions of different transactions over multiple virtual channels is illustrated.
- the priority scheme for access to the interconnect 12 is weighted, meaning VCO is awarded access (40%) of the time and VC 1 -VC 3 are each awarded access (20%) of the time respectively.
- the interconnect is 128 bits wide.
- T 1 , T 2 , T 3 and T 4 there are four competing transactions, T 1 , T 2 , T 3 and T 4 :
- This example thus illustrates: (1) a weighted priority scheme where each virtual channel is awarded access to the interconnect 12 based on a predetermined ratio and (2) another illustration of the winning portions of different transactions being interleaved and transmitted over different the virtual channels associated with the interconnect 12 .
- the weighted ratios can be either strictly or not strictly enforced. For example, if there is a large degree of traffic on virtual channel VC 3 and limited to no traffic on the other virtual channels VC 0 , VC 1 and VC 2 , then VC 3 will carry all or a bulk of the traffic if the weighted ratio is strictly enforced. As a result, however, the interconnect 12 may be under-utilized as portions of transactions may not be sent every clock cycle or beat. On the other hand if the weighted ratio is not strictly enforced, then it is possible for the transaction traffic to be reallocated to increase the utilization of the interconnect (e.g., traffic is sent over a higher number of cycles or beats).
- transaction(s) is/are divided into portions or beats, they can be interleaved and transmitted over the shared interconnect 12 using any of the arbitration schemes as defined herein.
- arbitration schemes represent just a few examples. In other examples, low jitter, weighted, strict, round-robin or just about any other arbitration scheme may be used.
- the arbitration schemes listed or described herein should therefore be considered as exemplary and not limiting in any manner.
- switch 16 is responsible for directing transaction traffic from source sub-functions 14 (i.e., IP 1 , IP 2 and IP 3 ) to destination sub-functions 14 (i.e., I P4 , I P5 and I P6 ) over the shared interconnect 12 .
- source sub-functions 14 i.e., IP 1 , IP 2 and IP 3
- destination sub-functions 14 i.e., I P4 , I P5 and I P6
- switch 18 includes arbitration element 26 Z and optionally ARL 28 Z.
- elements 26 Z and ARL 28 Z operate in the complement of that described above, meaning transaction traffic generated by source IP agents 14 (i.e., IP 4 , IP 5 and IP 6 ) is arbitrated and sent over shared interconnect 12 Z to destination IP agents (i.e., IP 1 , IP 2 and IP 3 ).
- the arbitration can be performed without the ARL 28 Z, meaning the arbitration simply decides among competing ports 20 (e.g., Port 3, port 3 or Port 5) and the portion of the transaction associated with the winning port is transmitted over the interconnect 12 , regardless of the final destination of the portion.
- As elements 12 Z, 26 Z and 28 Z have previously been described, a detailed explanation is not provided herein for the sake of brevity.
- a SoC there can be multiple levels of sub-functions 14 and multiple shared interconnects 12 .
- the above described arbitration scheme can be used to arbitrate among transactions sent over the interconnects 12 between the various sub-functions simultaneously.
- the SoC 800 includes an interconnect 802 , a plurality of IP agents 14 (e.g., Agent 1 through Agent N), one or more links 803 connecting or coupling the IP agents 14 to the interconnect 802 , and a system controller 804 .
- each IP agent 14 may also include one or more dedicated “hard-wire” inputs for receiving reset input instructions. Such instructions may come from a number of sources, including from off the SoC, the system controller 804 , or another IP agent 14 , etc.
- the IP agents 14 may be disparate and may implement a wide variety of different functions.
- the interconnect 802 can be a wide variety of different types of interconnects, such a Network on a Chip (NoC), a bus, a switching network, etc.
- NoC Network on a Chip
- the links 803 may each be a dedicated link or a bus between each IP agent 14 and the interconnect 802 .
- access to the interconnect 802 can be shared among multiple IP agents 14 using one link 803 and an arbitration scheme is used to select among the competing IP agents 14 .
- a number of virtual channels may be associated with the one or more links 803 , such as the virtual channels associated with the shared link as previously described.
- the system controller 804 and the managers 806 , 808 and 809 may also be implemented in a number of different ways. For instance, as a CPU or microcontroller, as programmable logic, a complex state machine for handling all or most system control functions on the SoC 800 , a simple state machine for handling a few exception situations, or any combination thereof.
- the system controller 804 may reside on the SoC 800 as shown or, alternatively, located off the SoC 800 (not illustrated). Where a state machine is used, the states and the transitions between the states is typically hard-coded into the SoC 800 .
- one or more of the reset, power and/or quiesce managers 806 , 808 and 809 can each be centralized within the system controller 804 as shown. Alternatively, each manager 806 , 808 and/or 809 can be decentralized and distributed throughout various locations on the SoC 800 or even off the SoC. Each of the reset manager 806 , the power manager 808 and the quiesce manager 809 can be implemented in software, hardware, programmable logic, a state machine or any other suitable means.
- the reset manager 806 is responsible for managing the emergence of the various IP agents 14 on the SoC 800 from reset in an organized manner
- a reset of an IP agent 14 may be required or desired under a number of circumstances. For instance, a “cold reset” occurs following removal or disruption of power provided to the SoC 800 or a system wide reset of the SoC 800 .
- a “warm reset” occurs when one, a group or even all the IP agents 14 (similar to a cold reset) are reset, but power is not removed or disrupted from the SoC 800 .
- a warm reset can be implemented via signaling that originates either on the SoC 800 or externally. Regardless of how a reset is initiated, the reset manager 806 is responsible for managing the emergence of the IP agent 14 or IP agents 14 from reset in an organized manner.
- an IP agent 14 If an IP agent 14 is malfunctioning for some reason, it may have to be reset. Examples of malfunctioning IP agents 14 include situations where the IP agent 14 is non-responsive, is in an error state, or actively generating erroneous transactions. In yet other examples, an IP agent 14 may have to undergo a reset operation upon exiting a lower power state, such as one of several power saving modes as described below.
- the power manager 808 manages the process of placing the various IP agents 14 into a lower power state, typically one of several power saving modes. Depending on the mode, the power manager 808 may operate in cooperation with the reset manager 806 to reset an IP agent 14 if necessary.
- the quiesce manager 809 operates in cooperation with the system controller 804 , reset manager 806 , power manager 808 and the interconnect 802 to (1) transition an operational or malfunctioning IP agent 14 into either a reset or a power savings mode where the IP agent becomes inoperable, (2) places the link 803 between the interconnect and the IP agent 802 into a quiescent state and (3) directs the interconnect to operate as a proxy for the IP agent while inoperable.
- the memory 810 may include both volatile and non-volatile types of memory.
- the memory 810 may be centralized on the SoC 800 or may be widely distributed among the system controller 804 , the interconnect 802 , the links 803 , and any of the managers 806 , 808 and/or 809 .
- portions or all of the memory 810 may be provided off the SoC 800 .
- the volatile portions of the memory 810 are typically used for system memory, where the current data generated by the system controller 804 , managers 806 , 808 , 809 , interconnect 802 , IP agents 14 , etc., are stored.
- Such memory may include various caches, SRAM, DRAM, etc.
- the non-volatile or persistent portions of memory 810 is typically used for storing “boot-up” code for the SoC 800 .
- the boot code enables the system controller 804 , including the managers 806 , 808 , 809 , the interconnect 802 and the IP agents 14 , to each load their operating systems and/or other system software as needed to initiate operation after powering on.
- the reboot process typically includes a number of self-tests, which when completed, allow the entire system, including each of the IP agents 14 , to perform their normal operations.
- the non-volatile or persistent portions may be implemented using NVRAM (non-volatile random-access memory), EEPROM (electrically erasable programmable read only memory), a hard drive, CD ROM, etc.
- the reset manager 806 is responsible for coordinating the emergence from reset of any of the IP agents 14 in an organized manner. As noted herein, a reset of a given IP agent 14 may occur for any number of reasons, including (1) when the entire SoC 800 emerges from reset following an external reset, a re-start command or a power-on event or (2) or an individual IP agent 14 reset during operation of the SoC 800 due to malfunction, following a power down or sleep mode, etc. Regardless of the reason, a given IP agent 14 is ready to be introduced to the interconnect 802 once its internal reset sequence is complete. Upon emergence from reset, a negotiation is then coordinated between the IP agent 14 and its IP port 20 on the interconnect 802 over the link 803 .
- FIG. 9 is a flow diagram showing an exemplary IP agent reset negotiation sequence between an IP agent 14 and the interconnect 802 .
- the initial step 902 a determination is made if an IP agent 14 has emerged from reset and is ready to be introduced to the interconnect 802 or not. When emergence occurs, the subsequent steps 904 through 912 are followed to reintroduce the IP agent 14 to the interconnect 802 .
- the interconnect 802 In step 904 , the interconnect 802 generates inquires for the IP agent 14 at periodic intervals. With each inquiry, the interconnect 802 essentially asks the IP agent 14 if it is “awake” (i.e., is it transaction ready, meaning is it capable of sending or processing received transactions).
- the interconnect determines if it has received a positive response to the inquiry(s) from the IP agent 14 . If not, then the interconnect 802 continues to send the inquiries. If yes, then it signifies to the interconnect 802 that the IP agent 14 has partially completed its reset routine and is ready for the next phase of the negotiation.
- step 908 the interconnect 802 and the IP agent 14 continue their negotiation by exchanging their credit information respectively.
- the interconnect 802 and the IP agent 14 each exchange with the other the available number of beats (i.e., the amount of data that can be transmitted over the link 803 per clock cycle.
- Each partner on opposing sides of the link 803 after the exchange, knows the available number of credits the other has as a result of this negotiation.
- interconnect 802 and the IP agent 14 continue their negotiation by exchanging other useful information such as security credentials, an agreed upon number of virtual channels that may be associated with the link 803 coupling the interconnect 802 and the IP agent 14 , etc.
- the IP agent 14 is declared “transaction ready”. In other words, the IP agent is ready to either process incoming transactions received from the interconnect 802 or to send outgoing transactions over the interconnect 802 to another destination. Once the IP agent 14 is transaction ready, it becomes visible to both the interconnect 802 , the system controller 804 and any other element connected or otherwise coupled to the interconnect 802 , either directly or indirectly through intermediate circuitry, logic or other element.
- the reset manager 806 is also responsible for coordinating the reset of malfunctioning IP agents 14 .
- an IP agent 14 may misbehave (e.g., become non-responsive, enter an error state, erroneously generate transactions, or otherwise malfunction).
- the IP agent may be unable to process a received transaction.
- the originating IP agent that sent the transaction may get hung up waiting for a response.
- the hang up can be limited to just the originating IP agent 14 , the destination IP agent 14 , or in a worst case scenario, other portions or even the entire SoC 800 may be adversely affected. Accordingly, in certain circumstances, the misbehaving IP agent may need to be reset to correct the issue.
- FIG. 10 a flow diagram 1000 showing a reset sequence for a malfunctioning IP agent is shown.
- step 1002 the various IP agents 14 on the SoC 800 operate as normal by generating transmitted transactions and/or processing received transactions.
- decision step 1004 the system controller 804 monitors the operation of the IP agents. If no problems are detected, then the IP agents 14 continue their normal operation. On the other hand if an IP agent malfunctions, for any reason, then the reset manager 806 flags it as a malfunctioning IP agent 14 .
- step 1005 the system controller 804 and interconnect 802 further cooperate to initiate a number of processes that help the remainder of the SoC 800 operate without further issues or problems.
- additional processes may include:
- the system controller 804 requests that the interconnect 802 disallow any further transactions from being generated by the malfunctioning IP agent 14 ;
- the interconnect 802 may act as a proxy and respond to any transactions targeted for the malfunctioning IP agent 14 while undergoing the reset negotiation process. For example, the interconnect 802 may generate an exception message in response to the non-processed transaction. By acting as a proxy, potentially much larger system wide issues are avoided, including the entire system getting hung up because the sender of the transaction never received a response from the malfunctioning IP agent 14 .
- the exception message may be a number of different types, such as the IP agent 14 is not available, the IP agent is in a low power mode, etc. In general, a wide variety of different types of exception messages may be used, each indicative of the condition or error that has occurred.
- step 1006 the reset manager 806 generates a reset instruction for the malfunctioning IP agent 14 .
- the link 803 between the IP agent 14 to be reset and the interconnect 802 is placed in a quiescent state. This process is further described with regard to FIG. 14 .
- step 1008 the malfunctioning IP agent 14 initiates its reset routine in response to the instruction received over the interconnect 802 or which may be received via a dedicated reset wire. This process involves the IP agent 14 (1) executing its own reset protocol or routine and (2) negotiating with the interconnect 802 , as described above with regard to FIG. 9 .
- step 1012 it is determined if the reset negotiation of the IP agent 14 is complete. When complete, control returns to step 1002 and operation of the IP agents 14 and the SoC 800 resume as normal. As noted above, the reset IP agent 14 becomes visible to the interconnect 802 and the system controller after emerging from the reset and becomes transaction ready. Finally, in step 1014 , the link 803 between the now reset IP agent 14 and the interconnect 802 exits the quiescent mode. At this point, the interconnect 802 no longer needs to act as a proxy for the IP agent 14 .
- the power manager 808 is responsible for intelligently and selectively placing IP agents 14 into a lower power state, by placing the IP agents 14 in one of several power down modes.
- the powering down or placing of IP agents 14 into a powered down mode can be can be performed for a variety of reason.
- the power manager 808 may place IP agents into a power down mode to preserve limited battery power.
- the power manager 808 may place non-critical IP agents 14 into a low power mode to prevent overheating.
- the clock frequency for the IP agent 14 is slowed down if applicable.
- the supply voltage may be reduced if applicable.
- both the clock frequency and supply voltage may be reduced if applicable further reducing power consumption. It should be understood that reducing the clock frequency and/or supply voltage is done only when applicable, meaning not all IP agents 14 have the ability to operate at either a reduced clock frequency, a reduced supply voltage, or both.
- the commands for reducing the clock and/or supply voltage, when applicable can be derived from the system controller 804 or the IP agent 14 itself, provided the IP agent 14 has a low power, operational mode.
- the interconnect 802 may not play a significant role in this mode, meaning it may not have to act as a proxy for the IP agent 14 and generate responses for incoming transactions since the IP agent 14 can generate the response itself.
- the system controller 804 and/or interconnect 802 may reconfigure the link 803 settings for the IP agent 14 since its performance capability may be reduced while operating at the lower clock frequency.
- the setting(s) that may possibly be changed include the arbitration settings for the IP agent 14 or the possible a reduction in the count of permitted outstanding transactions.
- the clock is shut off and the power supply is reduced, but may not turned off completely.
- state information maintained in memory in the IP agent 14 is retained.
- the interconnect 802 “drains” the transactions that the IP agent has already issued by preventing new transactions from being initiated and waiting for outstanding transactions to complete. Once all the transactions are drained, the interconnect 802 may act as a proxy and perform similar processes (1), (2) and (3) as described above with regard to the resetting of a malfunctioning IP agent 14 .
- the voltage is first increased followed by an increase in the clock frequency.
- This mode is similar to mode 2 described immediately above, except the power is reduced to a point where state information maintained in the IP agent is lost.
- the interconnect 802 operates as a proxy as discussed above in this mode as well.
- the IP agent is required to go through a reset negotiation process, similar to that as described above with regard to FIG. 9 .
- the interconnect 802 operates as a proxy as discussed above. Upon power up, the supply voltage is first ramped up followed by the reset negotiation process as described above with regard to FIG. 9 .
- FIG. 11 is a flow diagram 1100 illustrating a sequence for placing an IP agent 14 in and out of the Low Power, Operational Mode.
- the IP agent 14 on the SoC 800 operates in its normal mode, meaning the standard clock frequency and voltage are used.
- decision step 1104 conditions within the SoC 800 are monitored by the system controller 804 . If operating conditions are relatively normal or no event occurs triggering a power down of the IP agent 14 , then the SoC and IP agent 14 continues to operate in its normal mode per step 1102 . However, if a trigger condition is met (e.g., a reduced battery supply, overheating, etc.), then the power manager 808 may elect to place the IP agent 14 into the low, power operational mode.
- a trigger condition e.g., a reduced battery supply, overheating, etc.
- the interconnect 802 may elect to reconfigure the link 803 .
- the reconfiguration may include changing the arbitration settings for the IP agent 14 or reducing the count of possible outstanding transactions to take into account the lower processing capability of the IP agent when operating at the lower power mode.
- step 1108 the operating clock frequency of the IP agent 14 is reduced if applicable. With the reduced clock frequency, the IP agent consumes less power.
- step 1110 the voltage supplied to the IP agent is reduced if applicable. By reducing the voltage, further power savings can be realized.
- the IP agent 14 With the clock frequency and/or the voltage reduced, the IP agent 14 remains operational. As a result, it is capable of processing transactions, although possibly at a slower rate when operating at its standard clock frequency and/or supply voltage.
- the interconnect 802 can act as a proxy as described above or can be adjusted or reconfigured to take into account and support the lower rate of performance of the IP agent 14 in the low power mode. Since these alternatives are optional, they do not necessarily have to be implemented.
- decision step 1112 the IP agent 14 operates in the low power mode until a decision is made to resume normal operation. In which case, the IP agent 14 undergoes a sequence to resume normal operation.
- the voltage is increase to the standard operating voltage if applicable (i.e., if the voltage was previously decreased).
- step 1116 the clock frequency is increased if applicable (i.e., provided the clock was previously decreased.
- step 1117 the IP agent returns to normal operation.
- step 1118 the interconnect returns any reconfigured interconnect setting to normal.
- the IP agent is ready to resume normal operation, as provided in step 1102 .
- FIG. 12 a flow diagram 1200 illustrating a sequence for powering down/up an IP agent 14 in the Low Power, Inoperable, State Information maintained mode is illustrated.
- step 1202 the IP agent 14 operates in its normal mode.
- step 1204 a decision is made to operate the IP agent 14 in low power, inoperable, state information maintained mode.
- the link 803 is placed in the quiescent state and the interconnect 802 is configured to operate as a proxy for the IP agent 14 .
- the interconnect 802 may send an exception message to the source of the non-processed transaction, possibly preventing a hang up situation from occurring because the sender of the transaction never received a response from the IP agent 14 .
- step 1208 the clock frequency of the IP agent 14 is reduced if applicable.
- step 1210 the operating voltage of the IP agent 14 is reduced if applicable. However, the voltage remains adequate so that memory or storage elements in the IP agent 14 maintain their state information.
- the IP agent 14 remains in the lower power state until a decision has been made to resume normal operation.
- the system controller 804 an event external to the SoC (e.g., a signal received from a sensor, signal received an external source, etc.), a timer, the IP agent itself or another IP agent, can all trigger the wake-up.
- an event external to the SoC e.g., a signal received from a sensor, signal received an external source, etc.
- a timer the IP agent itself or another IP agent
- steps 1214 and 1216 the voltage and clock frequency provided to the IP agent 14 are each increased if applicable. Since the state information has been retained, the IP agent 14 resumes normal operation in step 1217 .
- step 1218 link 803 exists the quiescent mode and the IP agent becomes transaction ready and the interconnect 802 is notified that it longer has to act as a proxy.
- FIG. 13 a flow diagram 1300 illustrating a sequence for the Low Power, Inoperable, Mode is illustrated.
- steps 1202 , 1206 and 1212 are the same as described above with regard to FIG. 12 . As such, a discussion of these steps are not repeated herein.
- steps 1302 a decision is made to power down the IP agent 14 .
- the interconnect is configured as a proxy (step 1206 ) and the clock for the IP agent 14 is turned off completely (if applicable) and/or the voltage is significantly reduced (if applicable) to the point where state information is lost in step 1304 .
- the voltage is ramped up (if applicable) and clock turned on (if applicable) in step 1306 .
- the IP agent 14 undergoes a reset operation, as previously described with regard to FIG. 9 . Once the reset is complete, the IP agent 14 becomes transaction ready. The system then waits for the link to exit the quiescent mode in step 1310 . Once the exit occurs, the IP agent is visible on the interconnect 802 . Thereafter, in step 1312 , the interconnect 802 no longer acts as a proxy for the IP agent 14 .
- the sequence is the same as FIG. 13 , except the power is turned off completely, as opposed to simply reduced. Otherwise the Power Off Mode sequence is the same. In this mode, the IP agent 14 consumes virtually no power, is inoperable, and the interconnect 802 may act as a proxy on behalf of the IP agent.
- FIG. 14 a flow chart 1400 illustrating the steps for placing a link 803 in the quiescent state is illustrated.
- the system controller 804 makes a decision that an IP agent 14 should be either reset or placed in one of the inoperable power saving modes.
- step 1404 the IP agent 14 is instructed to stop generating transactions.
- the system determines if all outstanding transactions are complete. For all outstanding Non-posted transactions, a Completion transaction must be received (i.e., with read transactions, the accessed data must be returned, with non-posted write transactions, an acknowledgement must be received). With Posted transactions, no response transaction is required. Posted transactions are therefore considered “complete” once they are sent by the IP agent.
- step 1408 the link 803 is placed in the quiescent state when all the outstanding transactions are complete. Thereafter, the interconnect 802 is configured as a proxy for the IP agent 14 .
- step 1410 the IP agent is ready to placed in either reset or the desired inoperable low power mode.
- FIGS. 15A-15D show flow diagrams of various for IP agent “wake-up” sequences.
- FIG. 15A a flow diagram 1500 illustrating an agent-initiated “wake-up” sequence is illustrated.
- the wake up sequence is initiated by the IP agent, but implemented through the system controller 804 .
- an IP agent 14 in an inoperable state detects a wake-up trigger event.
- an IP agent may be powered down or “off”, it may remain at least partially functional in the sense that it maintains the ability to detect when a wake-up trigger occurs.
- the wake-up trigger may include a number of different types of events. For example, it could be an internal timer that causes the IP agent 14 to wake-up after a predetermined period of time, or it can be an event external to the SoC 800 , such as another device that wishes to communicate with the IP agent 14 .
- the IP agent sends a “wake-up” communication over its link 803 to the interconnect 802 . Again, although the link is in the quiescent state when its corresponding IP agent 14 is in an inoperable state, it is capable of transmitting the wake-up signal to the interconnect 802 .
- the interconnect 802 is configured to “listen” for a wake-up signal from an inoperable IP agent. If the signal is detected, the interconnect 802 notifies the system controller 804 .
- step 1508 the system controller 804 may send command(s) over the interconnect 802 for the IP agent 14 to initiate its wake-up sequence.
- step 1510 the IP agent initiates its wake-up sequence in response to the command(s).
- the IP agent 14 asks the system controller to initiate the wake-up sequence.
- the IP agent In response to a wake-up command from the system controller, the IP agent initiates its own wake-up sequence.
- the system controller is therefore aware of the status of the IP agent as it emerges from its inoperable state and becomes visible on the interconnect 802 .
- FIG. 15B shows the sequence when the system controller 804 initiates a wake-up of an IP agent 14 .
- the system controller 804 sends wake up command(s) to the IP agent in step 1508 , and in response, the IP agent initiates its own wake up sequence in step 1510 .
- the wake up may be initiated off the SoC 800 via the system controller 804 .
- the system controller 804 receives the command(s), the above described process is initiated.
- FIG. 15C shows the sequence when the wake up command for an IP agent 14 that originates off the SoC 800 and is implemented through the system controller 804 .
- the system controller 804 receives the command in step 1512 .
- the system controller sends a wake up command to the IP agent in step 1508 , and in response, the IP agent initiates its own wake up sequence in step 1510 .
- the command is provided directly to the IP agent 14 via its hard-wire input.
- the IP agent initiates its own wake up sequence.
- a flow diagram 1520 illustrating an IP agent initiated and implemented wake up sequence is illustrated.
- a wake up condition such as any of those noted above, occurs in step 1522 .
- the IP agent initiates its own wake up sequence in step 1524 .
- the wake up sequence completes.
- the IP agent notifies the interconnect 802 and the system controller 804 , either directly or through the interconnect 802 , of its awoken status.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Linguistics (AREA)
- Quality & Reliability (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Multimedia (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Microcomputers (AREA)
- Information Transfer Systems (AREA)
- Power Sources (AREA)
- Bus Control (AREA)
Abstract
Description
- The present application claim priority of U.S. Provisional Patent Application No. 62/650,589 (PRT1P001P) filed Mar. 30, 2018 and U.S.
Provisional Application 62/691,117 (PRT1P002P) filed Jun. 28, 2018. Each of the above-listed priority applications are incorporated herein by reference in their entirety for all purposes. - The present application is directed to a System on a Chip (SoC), and more particularly, to a system and method for consistently implementing reset and/or power management functionality on SoC, which in turn, provides a more uniform system software view of SoCs, particularly across families of SoCs.
- A System on a Chip (“SoC”) is an integrated circuit that includes multiple sub-systems, often referred to as Intellectual Property (“IP”) agents. IP agents are typically “reusable” blocks of circuitry designed to implement or perform a specific function. By using IP agents, the time and cost of developing complex SoCs can be significantly reduced.
- SoCs typically include a system controller and an interconnect, such as a bus or Network on a Chip (NoC). The system controller runs system software and is provided to manage the overall operation of the SoC. The various IP agents are connected to the interconnect via one or more links and communicate with one another via the interconnect.
- SoC developers commonly use disparate IP agents, often from multiple vendors. Each IP agent will ordinarily implement its own unique procedures for reset. From the perspective of the system controller and the interconnect on the SoC, this is problematic for several reasons.
- A typical SoC will normally have multiple IP agents connected to the interconnect. Upon reset, each of the IP agents will likely emerge from the reset state at different times due to the unique reset procedures each uses. The different times each IP agent emerges from reset can cause significant problems. If a source IP agent generates a transaction for a destination IP agent that is still in reset, then the (1) destination IP agent is unable to process the request and (2) source IP agent never receives a reply. As a result, the entire system may get hung up, possibly requiring a system-wide reset.
- One known approach to prevent hang-ups is to design and place circuitry intermediate each link, between the interconnect and each IP agent. The purpose of this circuitry is to make sure that all the IP agents connected to the interconnect emerge from reset during the same clock cycle. This approach, however, has drawbacks for several reasons:
- 1. The design of the intermediate circuitry requires time and effort that will often delay the development of the SoC.
- 2. The intermediate circuitry, from one SoC to another, is typically developed by different design teams. As a result, the intermediate circuitry is usually different from one SoC to the next, or even between different sub-systems on the same SoC.
- 3. The complexity of the circuitry normally means the number of IP agents that can be connected to a given interconnect is limited. The practical effect of this restriction is that more interconnect levels are needed to accommodate a given number of IP agents. The overall complexity of the SoC is therefore increased.
- On occasion, IP agents malfunction. For example, IP agents may inject spurious transactions onto the interconnect, may fail to respond to a received transaction, generate an exception message, etc. In certain situations, the malfunctioning IP agent may need to be reset. With current SoC interconnect standards, there is no standardized IP agent reset mechanism. Either the entire SoC has to be reset, or intermediary circuitry needs to be designed to perform the necessary isolation, reset, and re-introduction of the IP to the system, etc.
- Power management is also not addressed with certain current SoC interconnect standards. The Advanced Microcontroller Bus Architecture (AMBA) protocol, for instance, does not address power management, and provides no method for intentionally powering down or turning off IP agents. To provide this capability, power management functionality typically needs to be custom designed into the SoC on a chip-by-chip basis, by developing for instance, additional intermediate circuitry on the links for handing power management.
- Many companies offering multiple SoCs will share certain amounts of the system software among similar devices to reduce the time to market. However, even with SoCs that are similar, the software typically cannot simply be ported from one device to another, even in situations where the IP agents may be the same. If there are minor differences in any intermediate circuitry used for reset and/or power management, the system software may need to be modified and debugged for each device.
- Companies that develop a large number of SoCs are thus challenged with (1) developing customized circuitry for implementing reset and possibly power management for each device and (2) modifying and debugging the system software for each device. This effort, across multiple devices is expensive, complex and time consuming, reducing the ability to quickly bring products to market.
- A system for consistently implementing reset and power management of IP agents on SoCs, removing the need for customization, and which leads to a consistent system software view among multiple SoCs, is therefore needed.
- A system for consistently implementing reset and power management of IP agents on SoCs, removing the need for customization, and which leads to a consistent system software view among multiple SoCs, is disclosed.
- In one embodiment, the system includes one or more IP agents, an interconnect and one or more links between the IP agents and the interconnect respectively. When the IP agents undergo a reset, an individual negotiation takes place between the interconnect and each IP agent over the link. With the individual negotiations, each IP agent can emerge from reset at its own time schedule, independently of the timing of the other IP agents. Upon emerging from reset, each IP agent becomes “transaction ready” and is introduced to the interconnect, becoming visible to other elements connected to the interconnect, such as the system controller.
- In another embodiment, the interconnect may be configured as a proxy for any IP agent that is inoperable. This feature is beneficial because it prevents system wide hang ups that may otherwise occur when an IP agent is targeted with a transaction (1) prior to being transaction ready, (2) malfunctioning and/or (3) inoperable when in a powered down state. With the interconnect acting as a proxy, an exception message can be sent to the source sending the transaction, preventing a hang up caused by the source waiting indefinitely for a response from the target IP agent.
- In yet other embodiments, the ability to arrange for the interconnect to act as a proxy for an IP agent enables (1) IP agents to be individually reset and (2) IP agents to be placed in a power saving state. In various embodiments, the power saving state can include one of several modes, including a low power, operational mode, a low power inoperable mode with state information either maintained or not retained, or a power off mode.
- The present invention thus solves a number of issues. It eliminates the need to create custom circuitry for (1) managing each IP agent to emerge from reset during the same time/clock cycle and (2) power management of IP agents. Instead, the present invention advantageously provides a uniform implementation for both these functions, which leads to a consistent system software view among multiple SoCs. With this consistent software view, much of the custom design and software modifications across families of SoCs is eliminated, saving development costs, reducing complexity, and providing a quicker time to market.
- The present application and the advantages thereof, may best be understood by reference to the following description taken in conjunction with the accompanying drawings in which:
-
FIG. 1 is a block diagram of a shared interconnect for a System on a Chip (SoC) in accordance with a non-exclusive embodiment. -
FIG. 2 is an exemplary packet of a transaction in accordance with a non-exclusive embodiment. -
FIG. 3A is a logic diagram illustrating an arbitration element in accordance with a first non-exclusive embodiments. -
FIG. 3B is a logic diagram illustrating an arbitration element in accordance with a second non-exclusive embodiment. -
FIG. 4 is a flow diagram illustrating operational steps for arbitrating and sending portion(s) of transactions over virtual channels of the shared interconnect in accordance with a non-exclusive embodiment. -
FIG. 5 illustrates a first example of the interleaving the transmission of portions of different transactions over virtual channels of the shared interconnect in accordance with a non-exclusive embodiment. -
FIG. 6 illustrates a second example of the interleaving the transmission of portions of different transactions over virtual channels of the shared interconnect in accordance with a non-exclusive embodiment. -
FIG. 7 illustrates is a block diagram of two shared interconnects for handling traffic in two directions in accordance with another non-exclusive embodiment of the invention. -
FIG. 8 illustrates a block diagram of an SoC having reset, power management and quiesce functionality in accordance with a non-exclusive embodiment of the invention. -
FIG. 9 is a flow diagram showing an IP agent reset sequence in accordance with a non-exclusive embodiment of the invention. -
FIG. 10 is a flow diagram showing a reset sequence for a malfunctioning IP agent in accordance with a non-exclusive embodiment of the invention. -
FIG. 11 is a flow diagram illustrating a power down/up sequence for an IP agent in accordance with a non-exclusive embodiment of the invention. -
FIG. 12 is a flow diagram illustrating a power down/up sequence for an IP agent in accordance with a non-exclusive embodiment of the invention. -
FIG. 13 is a flow diagram illustrating a power down/up sequence for an IP agent in accordance with a yet another non-exclusive embodiment of the invention. -
FIG. 14 is a flow chart illustrating the steps for placing a link in a quiescent state. -
FIG. 15A-15D are flow diagrams illustrating various “wake-up” sequences for an IP agent. - In the drawings, like reference numerals are sometimes used to designate like structural elements.
- The present application will now be described in detail with reference to a few non-exclusive embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. It will be apparent, however, to one skilled in the art, that the present discloser may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the present disclosure.
- Many of the integrated circuits under development today are extremely complex. As a result, many chip designers have resorted to the System on a Chip or “SoC” approach, interconnecting a multiple sub-systems or IP agents on a single piece of silicon. SoCs are now available or are being developed for wide variety of applications, such as consumer devices (e.g., handheld, mobile phones, tablet computers, laptop and desktop computers, media processing etc.), virtual or augmented reality (e.g., robotics, autonomous vehicles, aviation, etc.), medical instrumentation (e.g., imaging, etc.), industrial, home automation, industrial (e.g., smart appliances, home surveillance, etc.) and data center applications (e.g., network switches, attached storage devices, etc.).
- The present application is broadly directed to an arbitration system and method for arbitrating access to a shared resource. Such a shared resource can be, for example, a bus interconnect, a memory resource, a processing resource, or just about any other resource that is shared among multiple vying parties. For the sake of illustration, the shared resources as described in detail below is an interconnect that is shared by a plurality of sub-systems on a System on a Chip or “SoC”.
- With an SoC, as described in detail below, there are a plurality of sub-systems that exchange traffic with one another in the form of transactions, the shared resource is a physical interconnect, various transactions, or portions thereof, are transmitted over a multiplicity of virtual channels associated with the shared interconnect and one of a number of different arbitration schemes and/or priorities may be used to arbitrate access to the shared interconnect for the transmission of transactions between the sub-functions.
- Within the above-mentioned shared interconnect used for SoCs, there are at least three types or classes of transactions, including Posted (P), Non-posted (NP) and Completion (C). A brief definition of each is provided in Table I below.
-
TABLE I Transaction Class Description Posted (P) A transaction that requires no response (e.g., a write operation) Non-posted (NP) A transaction that requires a response transaction from the destination agent (e.g., a read or a write operation) Completion (C) A response transaction for a non-posted transaction. - A Posted transaction, such as a write, requires no response transaction. Once a source writes data to a designated destination, the transaction is finished. With a Non-posted transaction, such as either a read or a write, a response is required. However, the response is bifurcated as a separate Completion transaction. In other words with a read, a first transaction is used for the read operation, while a separate, but related, Completion transaction is used for returning the read contents. With a Non-posted write, a first transaction is used for the write, while a second related Completion transaction is required for the confirmation once the write is complete.
- Transactions, regardless of the type, can be represented by one or more packets. In some circumstances, a transaction may be represented by a single packet. In other circumstances, multiple packets may be needed to represent the entire transaction.
- A beat is the amount of data that can be transmitted over the shared interconnect per clock cycle. For example if the shared interconnect is physically 128 bits wide, then 128 bits can be transmitted each beat or clock cycle.
- In some circumstances, a transaction may need to be divided into multiple portions for transmission. Consider a transaction having a single packet that has a payload that is 512 bits (64 bytes). If the shared interconnect is only 128 bits wide (16 bytes), then the transaction needs to be segmented into four portions (e.g. 4×128=512) and transmitted over four clock cycles or beats. On the other hand if a transaction is only a single packet that is 128 bits wide or less, then the entire transaction can be sent in one clock cycle or beat. If the same transaction happens to include additional packets, then additional clock cycles or beats may be needed.
- The term “portion” of a transaction is therefore the amount of data that can be transferred over the shared interconnect during a given clock cycle or beat. The size of a portion may vary depending on the physical width of the shared interconnect. For instance, if the shared interconnect is physically 64 data bits wide, then the maximum number of bits that can be transferred during any one cycle or beat is 64 bits. If a given transaction has a payload of 64 bits or less, then the entire transaction can be sent over the shared interconnect in a single portion. On the other hand if the payload is larger, then the packet has to be sent over the shared interconnect in multiple portions. A transaction with a payload of 128, 256 or 512 bits requires two (2), four (4) and eight (8) portions respectively. As such, the term “portion” or “portions” should therefore be broadly construed to mean either part of or an entire transaction that may be sent over the share interconnect during any given clock cycle or beat.
- A stream is defined as the pairing of a virtual channel and a transaction class. For instance, if there are four (4) virtual channels (e.g., VC0, VC1, VC2 and VC3) and three (3) transaction classes (P, NP, C), then there are a maximum of twelve (12) different possible streams. The various combinations of virtual channels and transaction classes are detailed below in Table II.
-
TABLE II Stream Number VC/ TC Combination 1 VC0/ NP 2 VC0/ P 3 VC0/ C 4 VC1/ NP 5 VC1/ P 6 VC1/ C 7 VC2/ NP 8 VC2/P 9 VC2/ C 10 VC3/NP 11 VC3/ P 12 VC3/C - It should be noted that the number of transaction classes discussed above is merely exemplary and should not be construed as limiting. On the contrary, any number of virtual channels and/or transaction classes may be used.
- Referring to
FIG. 1 , a block diagram of anarbitration system 10 is shown. In a non-exclusive embodiment, the arbitration system is used for arbitrating access by a number of sub-functions 14 (i.e., IP1, IP2 and IP3) to a sharedinterconnect 12 attempting to send transactions to upstream sub-functions 14 (i.e., IP4, IP5 and IP6). - The shared
interconnect 12 is a physical interconnect that is N data bits wide and includes M control bits. The sharedinterconnect 12 is also one-directional, meaning it handles traffic only from a source (i.e., IP1, IP2 and IP3) to a destination (i.e., IP4, IP5 and IP6). - In various alternatives, the number of N data bits can be any integer, but typically is some power of the number 2 (e.g., 21, 22, 23, 24, 25, 26, 27, 28 29 etc.) or (2, 4, 6, 8, 16, 32, 64, 128, 256 etc.) bits wide respectively. With most real-world applications, the number of N bits is either 32, 64, 128, 256 or even 512. However, it should be understood that these widths are merely illustrative and should not be construed as limiting in any manner.
- The number of control bits M may also vary and be any number.
- One or more logical channels (not illustrated), hereafter referred to as “virtual channels” or “VCs” are associated with the shared
interconnect 12. Each virtual channel is independent. Each virtual channel may be associated with multiple independent streams. The number of virtual channels may widely vary. For example, up to thirty-two (32) or more virtual channels may be defined or associated with the sharedinterconnect 12. - In various alternative embodiments, each virtual channel may be assigned a different priority. One or more virtual channel(s) may be assigned a higher priority, while one or more other virtual channel(s) may be assigned a lower priority. The higher priority channels are awarded or arbitrated access to the shared
interconnect 12 over the lower priority virtual channels. With other embodiments, each of the virtual channels may be given the same priority, in which case, no preference is given to one virtual channel versus another when awarding or arbitrating access to sharedinterconnect 12. In yet other embodiments, the priority assigned to one or more of the virtual channels may also dynamically change. For instance, in a first set of circumstances, all the virtual channels may be assigned the same priority, but in a second set of circumstances, certain virtual channel(s) can be assigned a higher priority than other virtual channel(s). Thus as circumstances change, the priority scheme used among the virtual channels can be varied to best meet current operating conditions. - Each of the sub-systems 14 is typically a block of “reusable” circuitry or logic, commonly referred to as an IP core or agent. Most IP agents are designed to perform a specific function, for example, controllers for peripheral devices such as an Ethernet port, a display driver, an SDRAM interface, a USB port, etc. Such IP agents are generally used as “building blocks” that provide needed sub-system functionality within the overall design of a complex system provided on an integrated circuit (IC), such as either an Application Specific Integrated Circuit (ASIC) or a Field Programmable Gate Array (FPGA). By using a library of available IP agents, a chip designer can readily “bolt” together various logic functions in the design of a more complex integrated circuit, reducing design time and saving development costs. Although
sub-system agents 14 are described above in terms of a dedicated IP core, it should be understood that this is not a necessary requirement. On the contrary, asub-system 14 can also be a collection of IP functions connected to or sharing asingle port 20. Accordingly, the term “agent” should be broadly construed as any type of sub-system connected to aport 20, regardless if the sub-system performs a single function or multiple functions. - A pair of
switches sub-system agents 14 and the sharedinterconnect 12 viadedicated access ports 20 respectively. With the exemplary embodiment shown: - (1) The sub-system agents IP1, IP2, and IP3 connect with
switch 16 viaaccess Port 0,Port 1 andPort 2 respectively. - (2) The sub-system agents IP4, IP5, and IP6 connect with
switch 18 viaPort 3,Port 4 andPort 5 respectively. - (3) In addition, an
access port 22, via theinterconnect 12, provides sub-system agents IP4, IP5, and IP6 access to switch 16 in the aggregate. - The
switches Switch 16 selects up-stream traffic generated by the sub-system agents IP1, IP2, and/or IP3 and sends the traffic downstream over the sharedinterconnect 12. At theswitch 18, a de-multiplexing operation is performed and the traffic is provided to a target sub-system agent (i.e., either IP4, IP5, or IP6). - Each
access port 20 has a unique port identifier (ID) and provides eachsub-system agent 14 dedicated access to either switch 16 or 18. For instance, sub-system agents IP1, IP2 and IP3 are assigned to accessports Port 0,Port 1 andPort 2 respectively. Similarly, the sub-system agents IP4, IP5 and IP6 are assignedaccess ports Port 3,Port 4 andPort 5 respectively. - Besides providing ingress and egress points to/from the
switches unique port IDs 20 are used for addressing traffic between thesub-system agents 14. EachPort 20 has a certain amount of allocated addressable space insystem memory 24. - In certain non-exclusive embodiments, all or some of the
access ports 20 can also be assigned a “global” port identifier as well their unique port ID. Transactions and other traffic can be sent to all or some of the access ports assigned to the global port identifier. Accordingly, with the global identifier, transactions and other traffic can be widely disseminated or broadcast to all or some of theaccess ports 20, obviating the need to individually address eachaccess port 20 using its unique identifier. - The
switch 16 also includes anarbitration element 26, Address Resolution Logic (ARL) 28 and an address resolution Look Up Table (LUT) 30. - During operation, the sub-system agents IP1, IP2 and IP3 generate transactions. As each transaction is generated, it is packetized by the originating
sub-system agent 14 and then the packetized transaction is injected via the correspondingport 20 into alocal switch 16. For instance, portions of transactions generated by IP1, IP2 and IP3 are provided to switch 16 by viaports Port 0,Port 1 andPort 2 respectively. - The
ports 20 each include a number of first-in, first-out buffers (not illustrated) for each of the virtual channels associated with theinterconnect channel 12 respectively. In a non-exclusive embodiment, there are four (4) virtual channels. In which case, eachport 20 includes four buffers, one for each virtual channel Again, it should be understood that the number of virtual channels and buffers contained in theports 20 may vary and is not limited to four. On the contrary, the number of virtual channels and buffers may be more or less than four. - If a given transaction is represented by two (or more) portions, those portions are maintained in the same buffer. For instance, if
interconnect 12 is 128 data bits wide and a transaction is represented by a packet containing a payload of 512 bits, then the transaction needs to be segmented into four (4) portions that are transmitted over four clock cycles or beats. On the other hand if the transaction can be represented by a single packet having a payload of 64 bits, then the single portion can be transmitted in one clock cycle or beat. By maintaining all the portion(s) of given transaction in the same buffer, the virtual channels remain logically independent. In other words, all the traffic associated with a given transaction is always sent over the same virtual channel as a stream and is not bifurcated over multiple virtual channels. - The
arbitration element 26 is responsible for arbitrating among the competing buffered portions of transactions maintained by thevarious access ports 20. In a non-exclusive embodiment, thearbitration element 26 performs an arbitration every clock cycle, provided multiple competing transactions are available. The arbitration winner per cycle yields a portion of a transaction, from one of the sub-systems IP1, IP2 and IP3, that is granted access to and is transmitted over theinterconnect 12. - When generating transactions, the source sub-system IP1, IP2 and IP3 ordinarily knows the address in the address space for the possible destination sub-system agents IP4, IP5 and IP6, but does not know the information (e.g., the
Port IDs 20 and/or 22) needed to route the transactions to their destinations. In one embodiment, the local Address Resolution Logic (ARL) 28 is used for resolving the known destination address into the needed routing information. In other words, a source sub-agent 14 may simply know that it wishes to access a given address insystem memory 24. TheARL 28 is therefore tasked to access theLUT 30 and performs an address look up of the port(s) 20/22 along the delivery path to the final destination corresponding to the specified address. Once theports 20/22 is/are known, this information is inserted in a destination field in the packet(s) of the transaction. As a result, the packet(s) is/are delivered to theports 20/22 along the delivery path. As a general rule, downstream nodes along the delivery path do not have to perform additional look up(s) since the required delivery information is already known and included in the destination field of the packet(s). With other types of transactions, referred to as Source Based Routing (SBR) as described in more detail below, the source IP agent knows the destination port address. As a result, the lookup performed by theARL 28 typically does not need to be performed. - In an alternative embodiment, not all the nodes within the interconnect require an
ARL 28 andLUT 30. For nodes that do not have these elements, transactions without needed routing information can be forwarded to a default node. At the default node, anARL 28 andLUT 30 are accessed and the needed routing information can then be inserted into the headers of the packet(s) of transactions. The default node is typically upstream from the node without theARL 28 andLUT 30. However, this is by no means a requirement. The default node, or nodes, can be located anywhere on the SoC. By eliminatingARLs 28 andLUTs 30 from certain nodes, their complexity can be reduced. - The
ARL 28 may also be referred to as an “ordering point” because, besides decoding the forwarding destination for winning portion(s) of transactions, it defines a sequence order for the winning portion(s) of transactions within each virtual channel. As each arbitration is resolved, regardless of whether or not theARL 28 is used to perform an address port lookup, the winning portions of transactions are inserted into a first-in, first out queue provided for each virtual channel. The winning portions of transactions then await their turn for transmission over theinterconnect 12 in the buffer. - The
ARL 28 is also used for defining “upstream” and downstream” traffic. In other words any transactions generated by theIP agents 14 associated with switch 16 (i.e., IP1, IP2 and IP3) is considered upstream with respect to theARL 28. All transaction post the ARL 28 (i.e., transmitted to IP4, IP5 and IP6) is considered downstream traffic. - The
IP agents 14 associated with switch 16 (i.e., IP1, IP2 and IP3) may communicate and send transactions to one another, either directly or indirectly. With direct communication, often referred to as Source Based Routing (SBR), theIP agents 14 can send transactions to one another in a peer-to-peer model. With this model, the source IP agent knows the unique Port ID of itspeer IP agents 14, bypassing the need to use theARL 28 to access theLUT 30. Alternatively, the transactions between the IP agents associated with theswitch 16 can be routed using theARL 28. With this model, similar to that described above, the source IP agent only knows the address of thedestination IP agent 14, but not the information needed for routing. TheARL 28 is then used to access theLUT 30, find the corresponding Port ID, which is then inserted into the destination field of the packet(s) of the transaction. - The
IP agents 14 create and process transactions over virtual channels associated with theinterconnect 12. Each transaction typically is made up of one or more packets. Each Packet typically has a fixed header size and format. In some instances, each packet may have a fixed sized payload. In other instances, packet payloads may vary in size, from large too small, or even with no payload at all. - Referring to
FIG. 2 , anexemplary packet 32 is shown. Thepacket 32 includes aheader 34 and apayload 36. In this particular embodiment, theheader 34 is sixteen (16) Bytes in size. It should be understood that this size is exemplary and either a larger size (e.g., more Bytes) or smaller size (e.g., fewer Bytes) packets may be used. It should also be understood thatheaders 34 ofpackets 32 do not necessarily have to all be the same size. In alternative embodiments, the size of packet headers in a SoC may be variable. - The
header 34 includes a number of fields including a destination identifier (DST_ID), a source identifier (SRC_ID), a payload size indicator (PLD_SZ), a reserved field (RSVD), a command field (CMD), a TAG field, a status (STS), a transaction ID field (TAG), an address or ADDR field, a USDR/Compact payload field, a transaction Class or TC field, a format FMT filed, and a Byte Enable (BE) field. The various fields of theheader 34 are briefly described in Table III below. -
TABLE III Name of Field Description DST Specifies the corresponding Port ID for the targeted IP agent 14. SRC Specifies the Port ID for the sending IP agent 14.PLD_SZ Specifies the size of the payload of the packet. CMD Specifies the type of transaction/command the packet contains. Exemplary commands may include Incremental Read, Incremental Write, Compact Read, Compact Write, Write to FIFO, Destructive Incremental Read, Wrap, etc. TAG Specifies a transaction ID for the packet. Transactions IDs are used for matching Non-posted transactions and their corresponding Completion transactions. When a Completion transaction including a matching transaction ID in the TAG field is received, the corresponding Non-posted read or write operation is complete. ADDR Specifies the physical address in system memory 24 of therequest USRD/ If the payload of the packet is sufficiently small, it can be Compact transported in this field in the header, not the payload. This payload field can also be used to transport a private or secure message between the source and the destination IP ports. STS This field is valid only with Completion packets. Specifies the status of the corresponding Non-posted transaction, (i.e., either a successful completion or a failed transaction). RSVD This is a reserved field that can also be used to transport a private or secure message between the source and the destination IP ports. FMT Specifies the format specification if multiple header formats are defined and used. BE Byte Enable, indicates which bytes in the payload are valid. - The
payload 36 contains the contents of the packet. The size of the payload may vary. In some instances, the payload may be large. In other instances, it could be small. In yet other instances, if the content is very small or “compact”, it can be transported in the USRD field of theheader 34. - The type of transaction will often dictate whether or not the packet(s) used to represent the transaction has/have payloads or not. For example with either a Posted or Non-posted read, the packet(s) will designate the location address to be accessed, but will typically have no payload. The packets for the related Completion transaction, however, will include payload(s) containing the read content. With both Posted and Non-posted write transactions, the packet(s) will include a payload containing the data to be written to the destination. With Non-posted versions of a write, the packets for the Completion transaction will ordinarily not defined a payload. However, in some situations, a Completion transaction will define a payload.
- The exemplary packet and above description covers many of basic fields that may be included in a packet. It should be understood that additional fields may be deleted or added. For instance, a private signaling field may be used so a source and a destination may share private messages.
- Referring to
FIG. 3A , a logic diagram illustrating the arbitration logic performed by thearbitration element 26 with Peripheral Component Interconnect (PCI) ordering is shown. - With PCI ordering, each
Port 20 includes separate buffers for each virtual channel and transaction class (P, NP and C) combination. For instance, with four virtual channels (VC0, VC1, VC2 and VC3), thePorts 0,Port 1 andPort 2 each have twelve first-in, first-out buffers. In other words for eachPort 20, a buffer is provided for each transaction class (P, NP, and C) and virtual channel (VC0, VC1, VC2 and VC30 combination. - As each IP agent 14 (e.g., IP1, IP2 and IP3) generates transactions, the resulting packets are placed in the appropriate buffer, based on transaction type, in the corresponding port (e.g.,
Port 0,Port 1 and Port 2) respectively. For instance, Posted (P), Non-posted (NP) and Completion (C) transactions generated by IP1 are each placed in the Posted, Non-posted and Completion buffers for the assigned virtual channel inPort 0 respectively. Transactions generated by IP2 and IP3 are similarly placed in the Posted, Non-posted and Completion buffers for the assigned virtual channels inPorts 1 andPort 2 in a similar manner. - If a given transaction is represented by multiple packets, all of the packets of that transaction are inserted into the same buffer. As a result, all of the packets of the transaction are eventually transmitted over the same virtual channel With this policy, the virtual channels remain independent, meaning different virtual channels are not used for transmission of multiple packets associated with the same transaction.
- Within each
port 20, packets can be assigned to a given virtual channel in a number of different ways. For instance, the assignment can be arbitrary. Alternatively, the assignment can be based on workload and the amount of outstanding traffic for each of the virtual channels. If one channel is very busy and the other not, then theport 20 will often attempt to balance the load and assign newly generated transaction traffic to under-utilized virtual channels. As a result, routing efficiency is improved. In yet other alternatives, transaction traffic can be assigned to a particular virtual channel based on urgency, security, or even a combination of both. If a certain virtual channel is given a higher priority and/or security than others, then high priority and/or secure traffic is assigned to the higher priority virtual channel. In yet other embodiments, aport 20 can be hard-coded, meaning theport 20 has only one virtual channel and all traffic generated by thatport 20 is transmitted over the one virtual channel. In yet other embodiments, the assignment can be based on the route chosen to reach thedestination port 20 - In yet other embodiments, the assignment of virtual channels can be implemented by the
source IP agents 14, either alone or in cooperation with its correspondingport 20. For example, asource IP agent 14 can generate a control signal to the correspondingport 20 requesting that packet(s) of a given transaction be assigned to a particular virtual channel.IP agents 14 can also make assignment decisions that are arbitrary, hard coded, based on balanced usage across all the virtual channels, security, urgency, etc., as discussed above. - In selecting an arbitration winner, the
arbitration element 26 performs multiple arbitration steps per cycle. These arbitration steps include: - (1) Selecting a port;
- (2) Selecting a virtual channel; and
- (3) Selecting a transaction class.
- The above order (1), (2) and (3) is not fixed. On the contrary, the above three steps may be completed in any order. Regardless of which order is used, a single arbitration winner is selected each cycle. The winning transaction is then transmitted over the corresponding virtual channel associated with the
interconnect 12. - For each arbitration (1), (2) and (3) performed by
arbitration element 26, a number of arbitration schemes or rule sets may be used. Such arbitration schemes may include strict or absolute priority, a weighed priority where each of the four virtual channels is assigned a certain percentage of transaction traffic or a round-robin scheme where transactions are assigned to virtual channels in a predefined sequence order. In additional embodiments, other priority scheme such may be used. Also, it should be understood that thearbitration element 26 may dynamically switch among the different arbitration schemes from time-to-time and/or use the same or different arbitration schemes for each of the (1), (2) and (3) arbitrations respectively. - In an optional embodiment, availability of the
destination ports 20 defined by the outstanding transaction(s) considered during a given arbitration cycle are considered. If a buffer in adestination port 20 does not have the resources available to process a given transaction, then the corresponding virtual channel is not available. As a result, the transaction in question does not compete in the arbitration, but rather, waits until a subsequent arbitration cycle when the target resource becomes available. On the other hand, when target resource(s) is/are available, the corresponding transaction(s) are arbitrated and compete for access to theinterconnect 12. - The availability of the
destination ports 20 may be checked at different times with respect to the multiple arbitration steps (1), (2) and (3) noted above. For instance, the availability check can be performed prior to the arbitration cycle (i.e., prior to completion of any of steps (1), (2) and (3)). As a result, only transactions that define available destination resources is/are considered during the subsequent arbitration. Alternatively, the availability check can be performed intermediate any of the three arbitration steps (1), (2) and (3), regardless of the order in which they are implemented. - There are advantages and disadvantages in performing the destination resource availability check early or late in the arbitration process. By performing the check early, possible competing portions of transactions can potentially be eliminated from the competition if their destinations are not available. However, early notice of availability may create a significant amount of overhead on system resources. As a result, depending on circumstances, it may be more practical to perform the availability check later in a given arbitration cycle.
- For the arbitration step involving the selection of a transaction class, a number of rules are defined to arbitrate among competing portions of N, NP and C transactions. These rules include:
-
-
- A Posted transaction portion may not pass another Posted transaction portion;
- A Posted transaction portion must be able to pass a Non-posted transaction portion to avoid deadlock;
- A Posted transaction portion must be able to pass a Completion if both are in a strong order mode. In other words in the strong mode, the transaction need to be performed strictly in accordance with the rules and the rules cannot be relaxed; and
- A Posted request is permitted to pass a Completion, but passage is not mandatory, if any transaction portion has its Relaxed Order (RO) bit set. With relaxed order, the rules are generally followed, however exceptions can be made.
-
-
- A Non-posted transaction portion must not pass a Posted transaction portion;
- A Non-posted transaction portion must not pass another Non-posted transaction portion;
- A Non-posted transaction portion must not pass a Completion if both are in the strong order mode; and
- A Non-posted transaction portion is permitted to pass a Completion, but is not mandatory, if any transaction portion has its RO bit set.
-
-
- A Completion must not pass a Posted transaction portion if both are in the strong order mode;
- A Completion is permitted to pass a Posted transaction portion, but is not mandatory, if any transaction portion has its RO bit set;
- A Completion must not pass a Non-posted transaction portion if both are in the strong order mode;
- A Completion is permitted to pass a Non-posted transaction portion, but is not mandatory, if any transaction portion has its RO bit set; and
- A Completion is not permitted to pass another Completion.
- Table IV below provides a summary of the PCI ordering rules. In the boxes with no (a) and (b) options, then the strict ordering rules need to be followed. In the boxes of the Table having (a) and (b) options, either strict order (a) or relaxed order (b) rules may be applied, depending on if the RO bit is reset or set respectively. In various alternative embodiments, the RO bit can be set or reset either globally or on individually on the packet level.
-
TABLE IV Posted Non-posted Row Pass Request Request Completion Column? (Column 2) (Column 3) (Column 4) Posted Request No Yes (a) Yes Row A (b) Y/N Non-posted No No (a) No Request Row B (b) Y/N Completion (a) No (a) Yes No Row C (b) Y/N (b) Y/N - The
arbitration element 26 selects an ultimate winning transaction portion by performing, in no particular order, arbitrations among competingPorts 20, virtual channels and transactions classes respectively. The winning portion per cycle gains access to the sharedinterconnect 12 and is transmitted over the corresponding virtual channel. - Referring to
FIG. 3B , a logic diagram illustrating the arbitration logic performed by thearbitration element 26 with Device ordering is shown. The arbitration process, and possibly the consideration of available destination resources, is essentially the same as described above, except for two distinctions. - First, with Device ordering, there are only two transaction classes defined, including (a) Non-posted read or write transactions where a response for every request is required and (b) Completion transactions, which defined the required responses. Since there are only two transaction classes, there are only two (2) buffers per virtual channel in each
Port 20. For instance, with four (4) virtual channels (VC0, VC1, VC2 and VC3), each Port 20 (e.g.,Port 0,Port 1 and Port 2) has a total of eight (8) buffers. - Second, the rules for selecting a Transaction for Device ordering are also different than PCI ordering. With Device ordering, there are no strict rules governing the selection of one class over the over class. On the contrary, either transaction class can be arbitrarily selected. However, common practice typically calls for favoring Completion transactions to free up resources that may not be available until a Completion transaction is resolved.
- Otherwise, the arbitration process for Device order is essentially the same as described above. In other words for each arbitration cycle, the arbitration steps (1), (2) and (3) are performed, in any particular order, to select an arbitration winner. When the transaction class arbitration is performed, Device order rather than PCI order rules are used. In addition, the availability of destination resources and/or virtual channels may also be considered either prior to or intermediate any of the arbitration steps (1), (2) and (3).
- As previously noted, the above-described arbitration scheme can be used for sharing access to any shared resource and is not limited to use with just a shared interconnect. Such other shared resources may include the
ARL 28, a processing resource, a memory resource such as theLUT 30, or just about any other type of resource that is shared among multiple parties vying for access. - Referring to
FIG. 4 , a flow diagram 40 illustrating operational steps for arbitrating access to a shared resource is shown. - In
step 42, the various sourcesub-system agents 14 generate transactions. The transactions can be any of the three classes, including Posted (P), Non-posted (NP) and Completion (C). - In
step 44, each of the transactions generated by the sourcesub-system agents 14 are packetized. As previously noted, packetization of a given transaction may result in one or multiple packets. The packets may also vary in size, with some packets having large payloads and others having small or no payloads. In situations where a transaction is represented by a single packet having adata payload 36 that is smaller than the width of theinterconnect 12, the transaction can be represented by a single portion. In situations where a transaction is represented by multiple packets, or a single packet with adata payload 36 that is larger than the access width of the shared resource, then multiple portions are needed to represent the transaction. - In
step 46, the portion(s) of the packetized transactions generated by each of thesub-system agents 14 are injected into thelocal switch 16 via its correspondingport 20. Within theport 20, the packet(s) of each transaction are assigned to a virtual channel. As previously noted, the assignment can be arbitrary, hard coded, based on balanced usage across all the virtual channels, security, urgency, etc. - In
step 48, the portion(s) of the packetized transactions generated by each of thesub-system agents 14 are stored in the appropriate, first-in, first-out, buffer by both transaction class and by their assigned virtual channel (e.g., VC0, VC1, VC2 and VC3) respectively. As previously noted, virtual channels may be assigned by one of a number of different priority schemes, including strict or absolute priority, round-robin, weighted priority, least recently serviced, etc. If a given transaction has multiple portions, each portion will be stored in the same buffer. As a result, the multiple portions of a given transaction are transmitted over the same virtual channel associated with theinterconnect 12. As transaction portions are injected, the corresponding a counter for tracking the number content items in each buffer is decremented. If a particular buffer is filled, its counter is decremented to zero, meaning the buffer can no longer receive additional contents. - In steps 50, 52 and 54, first, second and third level arbitrations are performed. As previously noted, the selection of a
Port 20, a virtual channel and a transaction class can be performed in any order. -
Element 56 may be used to maintain the rules used to perform the first, second and third levels of arbitration. In each case, theelement 56 is used as needed in resolving each of the arbitration levels. For instance,element 56 may maintain PCI and/or Device ordering rules.Element 56 may also contain rules for implementing several priority schemes, such as strict or absolute priority, weighted priority, round robin, etc., and the logic or intelligence for deciding which to use in a given arbitration cycle. - In
step 58, a winner of the arbitration is determined. Instep 60, the winning portion is placed in a buffer used for accessing the shared resource and a counter associated with the buffer is decremented. - In
step 62, the buffer associated with the winning portion is incremented since the winning portion is no longer in the buffer. - In
step 64, the winning portion gains access to the shared resource. Once the access is complete, the buffer for the shared resource is incremented - The
steps 42 through 64 are continually repeated during successive clock cycles respectively. As different winning portions, each gains access to the shared resource. - Transactions can be transmitted over the
interconnect 12 in one of several modes. - In one mode, referred to as the “header in-line” mode the
header 34 of packet(s) 32 of a transaction are always transmitted first ahead of thepayload 36 in separate portions or beats respectively. The header in-line mode may or may not be wasteful of the bits available on theinterconnect 12, depending the relative size of theheader 34 and/or thepayload 36 with respect to the number of data bits N of theinterconnect 12. For instance, consider aninterconnect 12 that is 512 bits wide (N=512) and a packet having a header that is 128 bits and a payload of 256 bits. With this scenario, the 128 bits of the header are transmitted in a first portion or beat, while the remaining 384 bits of bandwidth of theinterconnect 12 are not used. In a second portion or beat, the 256 bits of thepayload 36 are transmitted, while the remaining 256 bits of theinterconnect 12 are not used. In this example, a significant percentage of the bandwidth of the interconnect is not used during the two beats. On the other hand if the majority of the packets of transactions are the same size or larger than the interconnect, than the degree of wasted bandwidth is reduced or possibly eliminated. For example with headers and/or payloads that are 384 or 512 bits, the amount of waste is either significantly reduced (e.g., with 384 bits) or eliminated altogether (e.g., with 512 bits). - In another mode, referred to as “header on side-band”, the
header 34 of a packet is transmitted “on the side” of the data, meaning using the control bits M, while thepayload 36 is transmitted over the N data bits of theinterconnect 12. With the header on side band mode, the number of bits or size of thepayload 36 of apacket 32 determines the number of beats needed to transmit the packet over a giveninterconnect 12. For instance, with apacket 32 having apayload 36 of 64, 128, 256 or 512 bits and aninterconnect 12 having 128 data bits (N=128), the packet requires 1, 1, 2 and 4 beats respectively. With the transmission of each of the beat(s), the header information is transmitted over the control bits M along with or “on the side” of the data of the payload over the N data bits of theinterconnect 12. - In yet another mode, the
header 34 ofpackets 32 are transmitted in line with the payload, but there is no requirement that theheader 34 and thepayload 36 must be transmitted in separate portions or beats. If apacket 32 has aheader 34 that is 128 bits and apayload 36 that is 128 bits, then the total size is 256 bits (128+128). If the N data bits ofinterconnect 12 is 64, 128, 256 or 512 bits wide, then a packet of 256 bits is transmitted in 4, 2, 1 and 1 beats respectively. In another example, apacket 32 has a header of 128 bits and apayload 36 of 256 bits, or a total packet size of 384 bits (128+256). With thesame interconnect 12 of N data bits of 64, 128, 256 or 512 wide, the packet is transmitted in 6, 3, 2, or 1 beats respectively. This mode will always be as least as efficient or more efficient as the header in-line mode described above. - Referring to
FIG. 5 , a first example of the interleaving of portions of different transactions over multiple virtual channels is illustrated. In this example, for the sake of simplicity, only two transactions are defined. The two transactions are competing for access to sharedinterconnect 12, which is 128 data bits wide (N=128) in this example. The details of the two transactions include: - (1) Transaction 1 (T1), which was generated at Time T1 and which is assigned to virtual channel VC2. The size of T1 is four beats, designated as T1A, T1B, T1C and T1D; and
- (2) Transaction 2 (T2), which was generated at Time T2 (after Time T1) is assigned to virtual channel VC0. The size of T2 is a single portion or beat.
- In this example, VC0 is assigned absolute or strict priority. Over the course of multiple cycles, the portions of the two transactions T1 and T2 are transmitted over the shared interconnect, as depicted in
FIG. 5 , as follows: - Cycle 1: Beat T1A of T1 is transmitted over VC2 because it is the only available transaction;
- Cycle 2: Beat T1B of T1 and the single portion of T2 are competing for access to the
interconnect 12. Since VCO has strict priority, T2 automatically wins. Accordingly, the beat of T2 is transmitted over VC0. - Cycle 3: Since there are no competing transactions, beat T1B of T1 is transmitted over VC2.
- Cycle 4: Since there are no competing transactions, beat T1C of T1 is transmitted over VC2.
- Cycle 5: Since there are no competing transactions, beat T1D of T1 is transmitted over VC2.
- This example illustrates (1) with a virtual channel with absolute priority, access to the shared
interconnect 12 is immediately awarded whenever traffic becomes available, regardless of whether or not other traffic has been previously waiting and (2) the winning portions or beats of different transactions are interleaved and transmitted over different virtual channels associated with theinterconnect 12. In this example, virtual channel VCO was given absolute priority. It should be understood that with absolute or strict priority schemes, any of the virtual channels may be assigned the highest priority. - Referring to
FIG. 6 , a second example of the interleaving of portions of different transactions over multiple virtual channels is illustrated. - In this example, the priority scheme for access to the
interconnect 12 is weighted, meaning VCO is awarded access (40%) of the time and VC1-VC3 are each awarded access (20%) of the time respectively. Also, the interconnect is 128 bits wide. - Further in this example, there are four competing transactions, T1, T2, T3 and T4:
-
- T1 is assigned to VC0 and includes four (4) portions or beats T1A, T1B, T1C and T1D;
- T2 is assigned to VC1 and includes two (2) portions or beats T2A and T2B;
- T3 is assigned to VC2 and includes two (2) portions or beats T3A and T3B;
- and
-
- T4 is assigned to VC3 and includes two (2) portions or beats T4A and T4B.
- With this example the priority scheme is weighed. As a result, each virtual channel will win according to its weight ratio. In other words over the course of ten cycles, VCO will win four times and VC1, VC2 and VC3 will each win two times. For instance, as illustrated in
FIG. 6 : -
- The four portions or beats T1A, T1B, T1C and T1D of T1 are transmitted over VCO in four (40%) of the ten (10) cycles (i.e., cycles 1, 4 7 and 10);
- The two portions or beats of T2A and T2B of T2 are transmitted over VC1 in two (20%) of the ten (10) cycles (i.e.,
cycle 2 and cycle 6); - The two portions or beats of T3A and T3B of T3 are transmitted over VC2 in two (20%) of the ten (10) cycles (i.e.,
cycle 5 and cycle 9); and - The two portions or beats of T4A and T4B of T4 are transmitted over VC3 in two (20%) of the ten (10) cycles (i.e.,
cycle 3 and cycle 8);
- This example thus illustrates: (1) a weighted priority scheme where each virtual channel is awarded access to the
interconnect 12 based on a predetermined ratio and (2) another illustration of the winning portions of different transactions being interleaved and transmitted over different the virtual channels associated with theinterconnect 12. - It should be understood with this weighted example there is sufficient traffic to allocate portions of transactions to the various virtual channels in accordance with the weighted ratios. If the amount of traffic on the other hand is insufficient, then the weighted ratios can be either strictly or not strictly enforced. For example, if there is a large degree of traffic on virtual channel VC3 and limited to no traffic on the other virtual channels VC0, VC1 and VC2, then VC3 will carry all or a bulk of the traffic if the weighted ratio is strictly enforced. As a result, however, the
interconnect 12 may be under-utilized as portions of transactions may not be sent every clock cycle or beat. On the other hand if the weighted ratio is not strictly enforced, then it is possible for the transaction traffic to be reallocated to increase the utilization of the interconnect (e.g., traffic is sent over a higher number of cycles or beats). - The above two examples are applicable regardless which of the above-described transmission modes are used. Once transaction(s) is/are divided into portions or beats, they can be interleaved and transmitted over the shared
interconnect 12 using any of the arbitration schemes as defined herein. - The above-described arbitration schemes represent just a few examples. In other examples, low jitter, weighted, strict, round-robin or just about any other arbitration scheme may be used. The arbitration schemes listed or described herein should therefore be considered as exemplary and not limiting in any manner.
- Up to now, for the sake of simplicity, only a single arbitration has been described. It should be understood, however, that in real-world applications, such as on a SoC, multiple arbitrations may occur simultaneously.
- Referring to
FIG. 7 , a block diagram of two sharedinterconnects switches switch 16 is responsible for directing transaction traffic from source sub-functions 14 (i.e., IP1, IP2 and IP3) to destination sub-functions 14 (i.e., IP4, IP5 and IP6) over the sharedinterconnect 12. To handle transactional traffic in the opposite direction, switch 18 includesarbitration element 26Z and optionallyARL 28Z. During operation,elements 26Z andARL 28Z operate in the complement of that described above, meaning transaction traffic generated by source IP agents 14 (i.e., IP4, IP5 and IP6) is arbitrated and sent over sharedinterconnect 12Z to destination IP agents (i.e., IP1, IP2 and IP3). Alternatively, the arbitration can be performed without theARL 28Z, meaning the arbitration simply decides among competing ports 20 (e.g.,Port 3,port 3 or Port 5) and the portion of the transaction associated with the winning port is transmitted over theinterconnect 12, regardless of the final destination of the portion. Aselements - In a SoC, there can be multiple levels of
sub-functions 14 and multiple sharedinterconnects 12. With each, the above described arbitration scheme can be used to arbitrate among transactions sent over theinterconnects 12 between the various sub-functions simultaneously. - Referring to
FIG. 8 , a block diagram of anSoC 800 having reset and power management functionality is illustrated. TheSoC 800 includes aninterconnect 802, a plurality of IP agents 14 (e.g.,Agent 1 through Agent N), one ormore links 803 connecting or coupling theIP agents 14 to theinterconnect 802, and asystem controller 804. Although not illustrated, eachIP agent 14 may also include one or more dedicated “hard-wire” inputs for receiving reset input instructions. Such instructions may come from a number of sources, including from off the SoC, thesystem controller 804, or anotherIP agent 14, etc. - In various embodiments, the
IP agents 14 may be disparate and may implement a wide variety of different functions. - The
interconnect 802 can be a wide variety of different types of interconnects, such a Network on a Chip (NoC), a bus, a switching network, etc. - In various embodiments, the
links 803 may each be a dedicated link or a bus between eachIP agent 14 and theinterconnect 802. Alternatively, access to theinterconnect 802 can be shared amongmultiple IP agents 14 using onelink 803 and an arbitration scheme is used to select among the competingIP agents 14. In yet another embodiment, a number of virtual channels may be associated with the one ormore links 803, such as the virtual channels associated with the shared link as previously described. - The
system controller 804 and themanagers SoC 800, a simple state machine for handling a few exception situations, or any combination thereof. Thesystem controller 804 may reside on theSoC 800 as shown or, alternatively, located off the SoC 800 (not illustrated). Where a state machine is used, the states and the transitions between the states is typically hard-coded into theSoC 800. - In yet other embodiments, one or more of the reset, power and/or
quiesce managers system controller 804 as shown. Alternatively, eachmanager SoC 800 or even off the SoC. Each of thereset manager 806, thepower manager 808 and thequiesce manager 809 can be implemented in software, hardware, programmable logic, a state machine or any other suitable means. - The
reset manager 806 is responsible for managing the emergence of thevarious IP agents 14 on theSoC 800 from reset in an organized manner A reset of anIP agent 14 may be required or desired under a number of circumstances. For instance, a “cold reset” occurs following removal or disruption of power provided to theSoC 800 or a system wide reset of theSoC 800. Alternatively, a “warm reset” occurs when one, a group or even all the IP agents 14 (similar to a cold reset) are reset, but power is not removed or disrupted from theSoC 800. A warm reset can be implemented via signaling that originates either on theSoC 800 or externally. Regardless of how a reset is initiated, thereset manager 806 is responsible for managing the emergence of theIP agent 14 orIP agents 14 from reset in an organized manner. - If an
IP agent 14 is malfunctioning for some reason, it may have to be reset. Examples of malfunctioningIP agents 14 include situations where theIP agent 14 is non-responsive, is in an error state, or actively generating erroneous transactions. In yet other examples, anIP agent 14 may have to undergo a reset operation upon exiting a lower power state, such as one of several power saving modes as described below. - The
power manager 808 manages the process of placing thevarious IP agents 14 into a lower power state, typically one of several power saving modes. Depending on the mode, thepower manager 808 may operate in cooperation with thereset manager 806 to reset anIP agent 14 if necessary. - The
quiesce manager 809 operates in cooperation with thesystem controller 804,reset manager 806,power manager 808 and theinterconnect 802 to (1) transition an operational or malfunctioningIP agent 14 into either a reset or a power savings mode where the IP agent becomes inoperable, (2) places thelink 803 between the interconnect and theIP agent 802 into a quiescent state and (3) directs the interconnect to operate as a proxy for the IP agent while inoperable. - The
memory 810 may include both volatile and non-volatile types of memory. In addition, thememory 810 may be centralized on theSoC 800 or may be widely distributed among thesystem controller 804, theinterconnect 802, thelinks 803, and any of themanagers memory 810 may be provided off theSoC 800. - The volatile portions of the
memory 810 are typically used for system memory, where the current data generated by thesystem controller 804,managers interconnect 802,IP agents 14, etc., are stored. Such memory may include various caches, SRAM, DRAM, etc. - The non-volatile or persistent portions of
memory 810 is typically used for storing “boot-up” code for theSoC 800. The boot code enables thesystem controller 804, including themanagers interconnect 802 and theIP agents 14, to each load their operating systems and/or other system software as needed to initiate operation after powering on. The reboot process typically includes a number of self-tests, which when completed, allow the entire system, including each of theIP agents 14, to perform their normal operations. The non-volatile or persistent portions may be implemented using NVRAM (non-volatile random-access memory), EEPROM (electrically erasable programmable read only memory), a hard drive, CD ROM, etc. - The
reset manager 806 is responsible for coordinating the emergence from reset of any of theIP agents 14 in an organized manner. As noted herein, a reset of a givenIP agent 14 may occur for any number of reasons, including (1) when theentire SoC 800 emerges from reset following an external reset, a re-start command or a power-on event or (2) or anindividual IP agent 14 reset during operation of theSoC 800 due to malfunction, following a power down or sleep mode, etc. Regardless of the reason, a givenIP agent 14 is ready to be introduced to theinterconnect 802 once its internal reset sequence is complete. Upon emergence from reset, a negotiation is then coordinated between theIP agent 14 and itsIP port 20 on theinterconnect 802 over thelink 803. - Referring to
FIG. 9 is a flow diagram showing an exemplary IP agent reset negotiation sequence between anIP agent 14 and theinterconnect 802. - In the
initial step 902, a determination is made if anIP agent 14 has emerged from reset and is ready to be introduced to theinterconnect 802 or not. When emergence occurs, thesubsequent steps 904 through 912 are followed to reintroduce theIP agent 14 to theinterconnect 802. - In
step 904, theinterconnect 802 generates inquires for theIP agent 14 at periodic intervals. With each inquiry, theinterconnect 802 essentially asks theIP agent 14 if it is “awake” (i.e., is it transaction ready, meaning is it capable of sending or processing received transactions). - In
decision 906, the interconnect determines if it has received a positive response to the inquiry(s) from theIP agent 14. If not, then theinterconnect 802 continues to send the inquiries. If yes, then it signifies to theinterconnect 802 that theIP agent 14 has partially completed its reset routine and is ready for the next phase of the negotiation. - In
step 908, theinterconnect 802 and theIP agent 14 continue their negotiation by exchanging their credit information respectively. Theinterconnect 802 and theIP agent 14 each exchange with the other the available number of beats (i.e., the amount of data that can be transmitted over thelink 803 per clock cycle. Each partner on opposing sides of thelink 803, after the exchange, knows the available number of credits the other has as a result of this negotiation. - In an
optional step 910,interconnect 802 and theIP agent 14 continue their negotiation by exchanging other useful information such as security credentials, an agreed upon number of virtual channels that may be associated with thelink 803 coupling theinterconnect 802 and theIP agent 14, etc. - In the
last step 912, when the negotiation is complete, theIP agent 14 is declared “transaction ready”. In other words, the IP agent is ready to either process incoming transactions received from theinterconnect 802 or to send outgoing transactions over theinterconnect 802 to another destination. Once theIP agent 14 is transaction ready, it becomes visible to both theinterconnect 802, thesystem controller 804 and any other element connected or otherwise coupled to theinterconnect 802, either directly or indirectly through intermediate circuitry, logic or other element. - The
reset manager 806 is also responsible for coordinating the reset of malfunctioningIP agents 14. During operation of theSoC 800, anIP agent 14 may misbehave (e.g., become non-responsive, enter an error state, erroneously generate transactions, or otherwise malfunction). For instance, the IP agent may be unable to process a received transaction. As a result, the originating IP agent that sent the transaction may get hung up waiting for a response. Depending on the severity of the problem, the hang up can be limited to just the originatingIP agent 14, thedestination IP agent 14, or in a worst case scenario, other portions or even theentire SoC 800 may be adversely affected. Accordingly, in certain circumstances, the misbehaving IP agent may need to be reset to correct the issue. - Referring to
FIG. 10 , a flow diagram 1000 showing a reset sequence for a malfunctioning IP agent is shown. - In
step 1002, thevarious IP agents 14 on theSoC 800 operate as normal by generating transmitted transactions and/or processing received transactions. - In
decision step 1004, thesystem controller 804 monitors the operation of the IP agents. If no problems are detected, then theIP agents 14 continue their normal operation. On the other hand if an IP agent malfunctions, for any reason, then thereset manager 806 flags it as a malfunctioningIP agent 14. - In
step 1005, thesystem controller 804 and interconnect 802 further cooperate to initiate a number of processes that help the remainder of theSoC 800 operate without further issues or problems. These additional processes may include: - 1. The
system controller 804 requests that theinterconnect 802 disallow any further transactions from being generated by the malfunctioningIP agent 14; - 2. Keeping track of outstanding transactions targeting the malfunctioning
IP agent 14; - 3. The
interconnect 802 may act as a proxy and respond to any transactions targeted for the malfunctioningIP agent 14 while undergoing the reset negotiation process. For example, theinterconnect 802 may generate an exception message in response to the non-processed transaction. By acting as a proxy, potentially much larger system wide issues are avoided, including the entire system getting hung up because the sender of the transaction never received a response from the malfunctioningIP agent 14. In various embodiments, the exception message may be a number of different types, such as theIP agent 14 is not available, the IP agent is in a low power mode, etc. In general, a wide variety of different types of exception messages may be used, each indicative of the condition or error that has occurred. - In
step 1006, thereset manager 806 generates a reset instruction for the malfunctioningIP agent 14. - In 1007, the
link 803 between theIP agent 14 to be reset and theinterconnect 802 is placed in a quiescent state. This process is further described with regard toFIG. 14 . - In
step 1008, the malfunctioningIP agent 14 initiates its reset routine in response to the instruction received over theinterconnect 802 or which may be received via a dedicated reset wire. This process involves the IP agent 14 (1) executing its own reset protocol or routine and (2) negotiating with theinterconnect 802, as described above with regard toFIG. 9 . - In
decision step 1012, it is determined if the reset negotiation of theIP agent 14 is complete. When complete, control returns to step 1002 and operation of theIP agents 14 and theSoC 800 resume as normal. As noted above, thereset IP agent 14 becomes visible to theinterconnect 802 and the system controller after emerging from the reset and becomes transaction ready. Finally, instep 1014, thelink 803 between the now resetIP agent 14 and theinterconnect 802 exits the quiescent mode. At this point, theinterconnect 802 no longer needs to act as a proxy for theIP agent 14. - The
power manager 808 is responsible for intelligently and selectively placingIP agents 14 into a lower power state, by placing theIP agents 14 in one of several power down modes. The powering down or placing ofIP agents 14 into a powered down mode can be can be performed for a variety of reason. - For example, if the
SoC 800 is used in a battery powered device, thepower manager 808 may place IP agents into a power down mode to preserve limited battery power. Alternatively, even in non-battery powered devices, thepower manager 808 may placenon-critical IP agents 14 into a low power mode to prevent overheating. These are just a few of the possible reasons for implementing power management. Other reasons may include placing one ormore IP agents 14 in a power down mode if they are not being used. In various alternative embodiments, the power down modes include: - 1. Low Power Mode, Operational:
- In one alternative, the clock frequency for the
IP agent 14 is slowed down if applicable. Alternatively, the supply voltage may be reduced if applicable. In yet another embodiment, both the clock frequency and supply voltage may be reduced if applicable further reducing power consumption. It should be understood that reducing the clock frequency and/or supply voltage is done only when applicable, meaning not allIP agents 14 have the ability to operate at either a reduced clock frequency, a reduced supply voltage, or both. In yet other embodiments, the commands for reducing the clock and/or supply voltage, when applicable, can be derived from thesystem controller 804 or theIP agent 14 itself, provided theIP agent 14 has a low power, operational mode. - Since the IP agent remains functional, the
interconnect 802 may not play a significant role in this mode, meaning it may not have to act as a proxy for theIP agent 14 and generate responses for incoming transactions since theIP agent 14 can generate the response itself. However, thesystem controller 804 and/orinterconnect 802 may reconfigure thelink 803 settings for theIP agent 14 since its performance capability may be reduced while operating at the lower clock frequency. The setting(s) that may possibly be changed include the arbitration settings for theIP agent 14 or the possible a reduction in the count of permitted outstanding transactions. When the IP agent exits this Low Power Mode, the voltage is first increased (if decreased) followed by an increase in the clock frequency (if decreased) and any changes to thelink 803 settings reverted back to normal operational mode (if reconfigured). - 2. Low Power, Inoperable Mode, State Information Maintained:
- In this mode, the clock is shut off and the power supply is reduced, but may not turned off completely. As a result, state information maintained in memory in the
IP agent 14 is retained. Prior to entering this mode, theinterconnect 802 “drains” the transactions that the IP agent has already issued by preventing new transactions from being initiated and waiting for outstanding transactions to complete. Once all the transactions are drained, theinterconnect 802 may act as a proxy and perform similar processes (1), (2) and (3) as described above with regard to the resetting of a malfunctioningIP agent 14. When the IP agent is returned to normal and exits this mode, the voltage is first increased followed by an increase in the clock frequency. - 3. Low Power, Inoperable, Mode—No State Information Retained:
- This mode is similar to
mode 2 described immediately above, except the power is reduced to a point where state information maintained in the IP agent is lost. Theinterconnect 802 operates as a proxy as discussed above in this mode as well. When powered back up, the IP agent is required to go through a reset negotiation process, similar to that as described above with regard toFIG. 9 . - 4. Power Off Mode:
- In this mode, the clock is turned off and power is completely removed. The
interconnect 802 operates as a proxy as discussed above. Upon power up, the supply voltage is first ramped up followed by the reset negotiation process as described above with regard toFIG. 9 . -
FIG. 11 is a flow diagram 1100 illustrating a sequence for placing anIP agent 14 in and out of the Low Power, Operational Mode. - In the
initial step 1102, theIP agent 14 on theSoC 800 operates in its normal mode, meaning the standard clock frequency and voltage are used. - In
decision step 1104, conditions within theSoC 800 are monitored by thesystem controller 804. If operating conditions are relatively normal or no event occurs triggering a power down of theIP agent 14, then the SoC andIP agent 14 continues to operate in its normal mode perstep 1102. However, if a trigger condition is met (e.g., a reduced battery supply, overheating, etc.), then thepower manager 808 may elect to place theIP agent 14 into the low, power operational mode. - In an
optional step 1106, theinterconnect 802 may elect to reconfigure thelink 803. The reconfiguration may include changing the arbitration settings for theIP agent 14 or reducing the count of possible outstanding transactions to take into account the lower processing capability of the IP agent when operating at the lower power mode. - In
step 1108, the operating clock frequency of theIP agent 14 is reduced if applicable. With the reduced clock frequency, the IP agent consumes less power. - In
step 1110, the voltage supplied to the IP agent is reduced if applicable. By reducing the voltage, further power savings can be realized. - With the clock frequency and/or the voltage reduced, the
IP agent 14 remains operational. As a result, it is capable of processing transactions, although possibly at a slower rate when operating at its standard clock frequency and/or supply voltage. In optional embodiments, theinterconnect 802 can act as a proxy as described above or can be adjusted or reconfigured to take into account and support the lower rate of performance of theIP agent 14 in the low power mode. Since these alternatives are optional, they do not necessarily have to be implemented. - In
decision step 1112, theIP agent 14 operates in the low power mode until a decision is made to resume normal operation. In which case, theIP agent 14 undergoes a sequence to resume normal operation. - In
optional step 1114, the voltage is increase to the standard operating voltage if applicable (i.e., if the voltage was previously decreased). - In
step 1116, the clock frequency is increased if applicable (i.e., provided the clock was previously decreased. Instep 1117, the IP agent returns to normal operation. - Finally, in
optional step 1118, the interconnect returns any reconfigured interconnect setting to normal. At this point, the IP agent is ready to resume normal operation, as provided instep 1102. - Referring to
FIG. 12 , a flow diagram 1200 illustrating a sequence for powering down/up anIP agent 14 in the Low Power, Inoperable, State Information maintained mode is illustrated. - In
step 1202, theIP agent 14 operates in its normal mode. - In
step 1204, a decision is made to operate theIP agent 14 in low power, inoperable, state information maintained mode. - In
step 1206, thelink 803 is placed in the quiescent state and theinterconnect 802 is configured to operate as a proxy for theIP agent 14. This typically involves (1) disallowing any new transactions from being generated by theIP agent 14, (2) waiting for any outstanding transactions to complete and then (3) acting as a proxy by responding to any transactions targeted for theIP agent 14. For example, theinterconnect 802 may send an exception message to the source of the non-processed transaction, possibly preventing a hang up situation from occurring because the sender of the transaction never received a response from theIP agent 14. - In
step 1208, the clock frequency of theIP agent 14 is reduced if applicable. - In
step 1210, the operating voltage of theIP agent 14 is reduced if applicable. However, the voltage remains adequate so that memory or storage elements in theIP agent 14 maintain their state information. - In
decision 1212, theIP agent 14 remains in the lower power state until a decision has been made to resume normal operation. Thesystem controller 804, an event external to the SoC (e.g., a signal received from a sensor, signal received an external source, etc.), a timer, the IP agent itself or another IP agent, can all trigger the wake-up. When this decision is made, the IP agent undergoes a sequence to resume normal operation. - In
steps IP agent 14 are each increased if applicable. Since the state information has been retained, theIP agent 14 resumes normal operation instep 1217. - In
step 1218, link 803 exists the quiescent mode and the IP agent becomes transaction ready and theinterconnect 802 is notified that it longer has to act as a proxy. - Referring to
FIG. 13 , a flow diagram 1300 illustrating a sequence for the Low Power, Inoperable, Mode is illustrated. In this sequence, steps 1202, 1206 and 1212 are the same as described above with regard toFIG. 12 . As such, a discussion of these steps are not repeated herein. - In
steps 1302, a decision is made to power down theIP agent 14. Thereafter, the interconnect is configured as a proxy (step 1206) and the clock for theIP agent 14 is turned off completely (if applicable) and/or the voltage is significantly reduced (if applicable) to the point where state information is lost instep 1304. Without state information, when a decision is made to resume normal operation perstep 1212, the voltage is ramped up (if applicable) and clock turned on (if applicable) instep 1306. Thereafter, theIP agent 14 undergoes a reset operation, as previously described with regard toFIG. 9 . Once the reset is complete, theIP agent 14 becomes transaction ready. The system then waits for the link to exit the quiescent mode instep 1310. Once the exit occurs, the IP agent is visible on theinterconnect 802. Thereafter, instep 1312, theinterconnect 802 no longer acts as a proxy for theIP agent 14. - Finally, for the Power Off Mode, the sequence is the same as
FIG. 13 , except the power is turned off completely, as opposed to simply reduced. Otherwise the Power Off Mode sequence is the same. In this mode, theIP agent 14 consumes virtually no power, is inoperable, and theinterconnect 802 may act as a proxy on behalf of the IP agent. - Referring to
FIG. 14 , aflow chart 1400 illustrating the steps for placing alink 803 in the quiescent state is illustrated. - In the
initial step 1402, thesystem controller 804 makes a decision that anIP agent 14 should be either reset or placed in one of the inoperable power saving modes. - In
step 1404, theIP agent 14 is instructed to stop generating transactions. - In
decision 1406, the system determines if all outstanding transactions are complete. For all outstanding Non-posted transactions, a Completion transaction must be received (i.e., with read transactions, the accessed data must be returned, with non-posted write transactions, an acknowledgement must be received). With Posted transactions, no response transaction is required. Posted transactions are therefore considered “complete” once they are sent by the IP agent. - In
step 1408, thelink 803 is placed in the quiescent state when all the outstanding transactions are complete. Thereafter, theinterconnect 802 is configured as a proxy for theIP agent 14. - In
step 1410, the IP agent is ready to placed in either reset or the desired inoperable low power mode. -
FIGS. 15A-15D show flow diagrams of various for IP agent “wake-up” sequences. - Referring to
FIG. 15A a flow diagram 1500 illustrating an agent-initiated “wake-up” sequence is illustrated. In this embodiment, the wake up sequence is initiated by the IP agent, but implemented through thesystem controller 804. - In
step 1502, anIP agent 14 in an inoperable state detects a wake-up trigger event. Although an IP agent may be powered down or “off”, it may remain at least partially functional in the sense that it maintains the ability to detect when a wake-up trigger occurs. The wake-up trigger may include a number of different types of events. For example, it could be an internal timer that causes theIP agent 14 to wake-up after a predetermined period of time, or it can be an event external to theSoC 800, such as another device that wishes to communicate with theIP agent 14. Instep 1504, the IP agent sends a “wake-up” communication over itslink 803 to theinterconnect 802. Again, although the link is in the quiescent state when itscorresponding IP agent 14 is in an inoperable state, it is capable of transmitting the wake-up signal to theinterconnect 802. - In
step 1506, theinterconnect 802 is configured to “listen” for a wake-up signal from an inoperable IP agent. If the signal is detected, theinterconnect 802 notifies thesystem controller 804. - In
step 1508, thesystem controller 804 may send command(s) over theinterconnect 802 for theIP agent 14 to initiate its wake-up sequence. - In
step 1510, the IP agent initiates its wake-up sequence in response to the command(s). - With the embodiment described above, the
IP agent 14 asks the system controller to initiate the wake-up sequence. In response to a wake-up command from the system controller, the IP agent initiates its own wake-up sequence. The system controller is therefore aware of the status of the IP agent as it emerges from its inoperable state and becomes visible on theinterconnect 802. -
FIG. 15B shows the sequence when thesystem controller 804 initiates a wake-up of anIP agent 14. With this sequence, thesystem controller 804 sends wake up command(s) to the IP agent instep 1508, and in response, the IP agent initiates its own wake up sequence instep 1510. In a variation of this embodiment (not illustrated), the wake up may be initiated off theSoC 800 via thesystem controller 804. When thesystem controller 804 receives the command(s), the above described process is initiated. -
FIG. 15C shows the sequence when the wake up command for anIP agent 14 that originates off theSoC 800 and is implemented through thesystem controller 804. With this sequence, thesystem controller 804 receives the command in step 1512. In response, the system controller sends a wake up command to the IP agent instep 1508, and in response, the IP agent initiates its own wake up sequence instep 1510. With direct wake up from off theSoC 800, the command is provided directly to theIP agent 14 via its hard-wire input. In response, the IP agent initiates its own wake up sequence. - Referring to
FIG. 15D , a flow diagram 1520 illustrating an IP agent initiated and implemented wake up sequence is illustrated. In this embodiment, a wake up condition, such as any of those noted above, occurs instep 1522. In response, the IP agent initiates its own wake up sequence instep 1524. Instep 1526, the wake up sequence completes. Thereafter, instep 1528, the IP agent notifies theinterconnect 802 and thesystem controller 804, either directly or through theinterconnect 802, of its awoken status. - In the above examples, sequences for transitioning a single IP agent into one of the above-described low power modes was described for the sake of simplicity. In actual embodiments,
multiple IP agents 14 on an SoC may be powered down concurrently. If two or more are powered down at or around the same time, each would independently undergo one the above described sequences, depending on the mode. - Although only a few embodiments have been described in detail, it should be appreciated that the present application may be implemented in many other forms without departing from the spirit or scope of the disclosure provided herein. Therefore, the present embodiments should be considered illustrative and not restrictive and is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/368,418 US20190302861A1 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (soc) agent reset and power management |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862650589P | 2018-03-30 | 2018-03-30 | |
US201862691117P | 2018-06-28 | 2018-06-28 | |
US16/368,418 US20190302861A1 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (soc) agent reset and power management |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190302861A1 true US20190302861A1 (en) | 2019-10-03 |
Family
ID=68054464
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/368,418 Abandoned US20190302861A1 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (soc) agent reset and power management |
US16/368,392 Abandoned US20190303777A1 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (soc) agent reset and power management |
US16/368,443 Active 2039-07-14 US11340671B2 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (SOC) agent reset and power management |
US17/656,378 Active US11914440B2 (en) | 2018-03-30 | 2022-03-24 | Protocol level control for system on a chip (SoC) agent reset and power management |
US17/804,367 Abandoned US20220291730A1 (en) | 2018-03-30 | 2022-05-27 | Protocol Level Control for System on a Chip (SOC) Agent Reset and Power Management |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/368,392 Abandoned US20190303777A1 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (soc) agent reset and power management |
US16/368,443 Active 2039-07-14 US11340671B2 (en) | 2018-03-30 | 2019-03-28 | Protocol level control for system on a chip (SOC) agent reset and power management |
US17/656,378 Active US11914440B2 (en) | 2018-03-30 | 2022-03-24 | Protocol level control for system on a chip (SoC) agent reset and power management |
US17/804,367 Abandoned US20220291730A1 (en) | 2018-03-30 | 2022-05-27 | Protocol Level Control for System on a Chip (SOC) Agent Reset and Power Management |
Country Status (6)
Country | Link |
---|---|
US (5) | US20190302861A1 (en) |
EP (1) | EP3776225A4 (en) |
JP (2) | JP7383631B2 (en) |
KR (1) | KR102679562B1 (en) |
IL (1) | IL277567A (en) |
WO (1) | WO2019191431A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200120597A1 (en) * | 2018-10-16 | 2020-04-16 | Hewlett Packard Enterprise Development Lp | Access point wake up |
US11074207B1 (en) | 2020-01-29 | 2021-07-27 | Samsung Electronics Co., Ltd. | System-on-chips and methods of controlling reset of system-on-chips |
US11340671B2 (en) | 2018-03-30 | 2022-05-24 | Google Llc | Protocol level control for system on a chip (SOC) agent reset and power management |
US11640362B2 (en) | 2018-03-30 | 2023-05-02 | Google Llc | Procedures for improving efficiency of an interconnect fabric on a system on chip |
US12001362B2 (en) | 2020-08-17 | 2024-06-04 | Nokia Technologies Oy | Dynamically reprogrammable topologically unique integrated circuit identification |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102589373B1 (en) * | 2018-05-15 | 2023-10-19 | 현대자동차주식회사 | Method and apparatus for wakeup of communication node in automotive network |
US11871308B2 (en) * | 2019-07-29 | 2024-01-09 | TapText llc | System and method for link-initiated dynamic-mode communications |
FR3117225B1 (en) * | 2020-12-04 | 2024-05-17 | Stmicroelectronics Grand Ouest Sas | Method for resetting a master device of a system-on-chip and corresponding system-on-chip |
US11989567B2 (en) * | 2022-03-24 | 2024-05-21 | Lenovo Global Technology (United States) Inc. | Automatic systems devices rediscovery |
Family Cites Families (76)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60031515T2 (en) | 1999-03-17 | 2007-08-23 | Broadcom Corp., Irvine | NETWORK AGENCY |
US6604159B1 (en) | 1999-08-12 | 2003-08-05 | Mips Technologies, Inc. | Data release to reduce latency in on-chip system bus |
US6829666B1 (en) | 1999-09-29 | 2004-12-07 | Silicon Graphics, Incorporated | Modular computing architecture having common communication interface |
US6654896B1 (en) * | 2000-05-16 | 2003-11-25 | Hewlett-Packard Development Company, L.P. | Handling of multiple compliant and non-compliant wake-up sources in a computer system |
US6678767B1 (en) | 2000-10-06 | 2004-01-13 | Broadcom Corp | Bus sampling on one edge of a clock signal and driving on another edge |
TW513635B (en) | 2000-11-24 | 2002-12-11 | Ibm | Method and structure for variable-length frame support in a shared memory switch |
WO2002069158A1 (en) | 2001-02-28 | 2002-09-06 | Brecis Communications | A multi-service system-on-chip |
US7174467B1 (en) | 2001-07-18 | 2007-02-06 | Advanced Micro Devices, Inc. | Message based power management in a multi-processor system |
US7577857B1 (en) * | 2001-08-29 | 2009-08-18 | 3Com Corporation | High speed network interface with automatic power management with auto-negotiation |
US6976134B1 (en) | 2001-09-28 | 2005-12-13 | Emc Corporation | Pooling and provisioning storage resources in a storage network |
US7664018B2 (en) | 2002-07-02 | 2010-02-16 | Emulex Design & Manufacturing Corporation | Methods and apparatus for switching fibre channel arbitrated loop devices |
US7283944B2 (en) | 2003-12-15 | 2007-10-16 | Springsoft, Inc. | Circuit simulation bus transaction analysis |
US7260688B1 (en) | 2004-04-15 | 2007-08-21 | Xilinx, Inc. | Method and apparatus for controlling access to memory circuitry |
US7500066B2 (en) | 2005-04-30 | 2009-03-03 | Tellabs Operations, Inc. | Method and apparatus for sharing instruction memory among a plurality of processors |
KR100653087B1 (en) | 2005-10-17 | 2006-12-01 | 삼성전자주식회사 | System for axi compatible network on chip and interleaving method thereof |
EP1785811B1 (en) * | 2005-11-14 | 2018-12-05 | Texas Instruments Incorporated | Memory information transfer power management |
US20070130344A1 (en) | 2005-11-14 | 2007-06-07 | Pepper Timothy C | Using load balancing to assign paths to hosts in a network |
US7912075B1 (en) | 2006-05-26 | 2011-03-22 | Avaya Inc. | Mechanisms and algorithms for arbitrating between and synchronizing state of duplicated media processing components |
US20110022754A1 (en) | 2007-12-06 | 2011-01-27 | Technion Research & Development Foundation Ltd | Bus enhanced network on chip |
US20090245257A1 (en) | 2008-04-01 | 2009-10-01 | International Business Machines Corporation | Network On Chip |
WO2010022767A1 (en) | 2008-08-26 | 2010-03-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet forwarding in a network |
WO2010069398A1 (en) | 2008-12-19 | 2010-06-24 | Telefonaktiebolaget L M Ericsson (Publ) | Resolving contention between data bursts |
US20100158005A1 (en) | 2008-12-23 | 2010-06-24 | Suvhasis Mukhopadhyay | System-On-a-Chip and Multi-Chip Systems Supporting Advanced Telecommunication Functions |
US8918488B2 (en) | 2009-02-04 | 2014-12-23 | Citrix Systems, Inc. | Methods and systems for automated management of virtual resources in a cloud computing environment |
US9514074B2 (en) | 2009-02-13 | 2016-12-06 | The Regents Of The University Of Michigan | Single cycle arbitration within an interconnect |
US8448001B1 (en) * | 2009-03-02 | 2013-05-21 | Marvell International Ltd. | System having a first device and second device in which the main power management module is configured to selectively supply a power and clock signal to change the power state of each device independently of the other device |
US20110320706A1 (en) | 2009-03-12 | 2011-12-29 | Hitachi, Ltd. | Storage apparatus and method for controlling the same |
JP5083464B2 (en) | 2009-05-25 | 2012-11-28 | 日本電気株式会社 | Network-on-chip and network routing methods and systems |
US8831666B2 (en) | 2009-06-30 | 2014-09-09 | Intel Corporation | Link power savings with state retention |
CN101651625B (en) | 2009-09-03 | 2011-09-21 | 中兴通讯股份有限公司 | Route selecting device and route selecting method of multi-service restoration |
US8782456B2 (en) | 2010-06-01 | 2014-07-15 | Intel Corporation | Dynamic and idle power reduction sequence using recombinant clock and power gating |
US8850250B2 (en) | 2010-06-01 | 2014-09-30 | Intel Corporation | Integration of processor and input/output hub |
US8904115B2 (en) | 2010-09-28 | 2014-12-02 | Texas Instruments Incorporated | Cache with multiple access pipelines |
KR101687273B1 (en) | 2011-08-22 | 2016-12-16 | 인텔 코포레이션 | Method for data throughput improvement in open core protocol based interconnection networks using dynamically selectable redundant shared link physical paths |
US8711867B2 (en) | 2011-08-26 | 2014-04-29 | Sonics, Inc. | Credit flow control scheme in a router with flexible link widths utilizing minimal storage |
CN103765409A (en) * | 2011-09-06 | 2014-04-30 | 英特尔公司 | Power efficient processor architecture |
US8868941B2 (en) * | 2011-09-19 | 2014-10-21 | Sonics, Inc. | Apparatus and methods for an interconnect power manager |
US8713234B2 (en) | 2011-09-29 | 2014-04-29 | Intel Corporation | Supporting multiple channels of a single interface |
US8711875B2 (en) | 2011-09-29 | 2014-04-29 | Intel Corporation | Aggregating completion messages in a sideband interface |
EP2761386B1 (en) | 2011-09-30 | 2017-09-06 | Intel Corporation | Managing sideband segments in on-die system fabric |
US20130117511A1 (en) * | 2011-11-08 | 2013-05-09 | Arm Limited | Data processing apparatus and method |
US9053251B2 (en) | 2011-11-29 | 2015-06-09 | Intel Corporation | Providing a sideband message interface for system on a chip (SoC) |
CN104081722B (en) | 2012-01-13 | 2018-05-22 | 英特尔公司 | Efficient peer-to-peer communications in SoC constructions are supported |
US8924779B2 (en) * | 2012-03-30 | 2014-12-30 | Lsi Corporation | Proxy responder for handling anomalies in a hardware system |
US9436623B2 (en) * | 2012-09-20 | 2016-09-06 | Intel Corporation | Run-time fabric reconfiguration |
US9612652B2 (en) | 2012-09-29 | 2017-04-04 | Intel Corporation | Controlling power consumption by power management link |
US9355058B2 (en) | 2012-10-22 | 2016-05-31 | Intel Corporation | High performance interconnect physical layer |
US9258234B1 (en) * | 2012-12-28 | 2016-02-09 | Juniper Networks, Inc. | Dynamically adjusting liveliness detection intervals for periodic network communications |
US9223668B2 (en) | 2013-03-13 | 2015-12-29 | Intel Corporation | Method and apparatus to trigger and trace on-chip system fabric transactions within the primary scalable fabric |
US9471521B2 (en) | 2013-05-15 | 2016-10-18 | Stmicroelectronics S.R.L. | Communication system for interfacing a plurality of transmission circuits with an interconnection network, and corresponding integrated circuit |
US20150026494A1 (en) | 2013-07-19 | 2015-01-22 | Sonics, Inc. | Intelligent mesochronous synchronizer |
US9473388B2 (en) | 2013-08-07 | 2016-10-18 | Netspeed Systems | Supporting multicast in NOC interconnect |
US20150199134A1 (en) | 2014-01-10 | 2015-07-16 | Qualcomm Incorporated | System and method for resolving dram page conflicts based on memory access patterns |
JP5847887B2 (en) | 2014-06-17 | 2016-01-27 | 株式会社東芝 | On-chip router and multi-core system using the same |
US9742630B2 (en) | 2014-09-22 | 2017-08-22 | Netspeed Systems | Configurable router for a network on chip (NoC) |
US9727114B2 (en) * | 2014-09-25 | 2017-08-08 | Telefonaktiebolaget L M Ericsson (Publ) | HW-controlled power domains with automatic power-on request |
US9971397B2 (en) * | 2014-10-08 | 2018-05-15 | Apple Inc. | Methods and apparatus for managing power with an inter-processor communication link between independently operable processors |
TWI536267B (en) * | 2014-11-07 | 2016-06-01 | 瑞昱半導體股份有限公司 | Control method applied to operating-mode finite-state-machine and computer readable media |
KR102347657B1 (en) * | 2014-12-02 | 2022-01-06 | 삼성전자 주식회사 | Electronic device and method for controlling shareable cache memory thereof |
US10210120B2 (en) | 2015-03-26 | 2019-02-19 | Intel Corporation | Method, apparatus and system to implement secondary bus functionality via a reconfigurable virtual switch |
GB2537855B (en) * | 2015-04-28 | 2018-10-24 | Advanced Risc Mach Ltd | Controlling transitions of devices between normal state and quiescent state |
US10157160B2 (en) * | 2015-06-04 | 2018-12-18 | Intel Corporation | Handling a partition reset in a multi-root system |
US9733689B2 (en) * | 2015-06-27 | 2017-08-15 | Intel Corporation | Hardware apparatuses and methods to perform transactional power management |
US10353747B2 (en) | 2015-07-13 | 2019-07-16 | Futurewei Technologies, Inc. | Shared memory controller and method of using same |
US10209734B2 (en) * | 2016-01-25 | 2019-02-19 | Samsung Electronics Co., Ltd. | Semiconductor device, semiconductor system, and method of operating the semiconductor device |
KR102497804B1 (en) | 2016-04-01 | 2023-02-10 | 한국전자통신연구원 | On-chip network device capable of networking in dual swithching network modes and operation method thereof |
US10133341B2 (en) * | 2016-06-06 | 2018-11-20 | Arm Limited | Delegating component power control |
US10452124B2 (en) * | 2016-09-12 | 2019-10-22 | Netspeed Systems, Inc. | Systems and methods for facilitating low power on a network-on-chip |
US10223128B2 (en) * | 2016-09-23 | 2019-03-05 | Apple Inc. | Booting and power management |
US10775871B2 (en) * | 2016-11-10 | 2020-09-15 | Apple Inc. | Methods and apparatus for providing individualized power control for peripheral sub-systems |
US10725955B2 (en) * | 2017-12-08 | 2020-07-28 | Arm Limited | Power control of inter-domain transaction bridge |
US10642341B2 (en) * | 2018-03-23 | 2020-05-05 | Juniper Networks, Inc. | Selective modification of power states based on conditions |
US10739836B2 (en) * | 2018-03-27 | 2020-08-11 | Intel Corporation | System, apparatus and method for handshaking protocol for low power state transitions |
US20190302861A1 (en) | 2018-03-30 | 2019-10-03 | Provino Technologies, Inc. | Protocol level control for system on a chip (soc) agent reset and power management |
IL315283A (en) | 2018-03-30 | 2024-10-01 | Google Llc | Arbitrating portions of transactions over virtual channels associated with an interconnect |
US11294850B2 (en) | 2019-03-29 | 2022-04-05 | Intel Corporation | System, apparatus and method for increasing bandwidth of edge-located agents of an integrated circuit |
-
2019
- 2019-03-28 US US16/368,418 patent/US20190302861A1/en not_active Abandoned
- 2019-03-28 US US16/368,392 patent/US20190303777A1/en not_active Abandoned
- 2019-03-28 JP JP2020552287A patent/JP7383631B2/en active Active
- 2019-03-28 WO PCT/US2019/024586 patent/WO2019191431A1/en active Application Filing
- 2019-03-28 EP EP19775100.1A patent/EP3776225A4/en active Pending
- 2019-03-28 US US16/368,443 patent/US11340671B2/en active Active
- 2019-03-28 KR KR1020207026420A patent/KR102679562B1/en active IP Right Grant
-
2020
- 2020-09-23 IL IL277567A patent/IL277567A/en unknown
-
2022
- 2022-03-24 US US17/656,378 patent/US11914440B2/en active Active
- 2022-05-27 US US17/804,367 patent/US20220291730A1/en not_active Abandoned
-
2023
- 2023-11-08 JP JP2023190712A patent/JP2024020317A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11340671B2 (en) | 2018-03-30 | 2022-05-24 | Google Llc | Protocol level control for system on a chip (SOC) agent reset and power management |
US11640362B2 (en) | 2018-03-30 | 2023-05-02 | Google Llc | Procedures for improving efficiency of an interconnect fabric on a system on chip |
US11914440B2 (en) | 2018-03-30 | 2024-02-27 | Google Llc | Protocol level control for system on a chip (SoC) agent reset and power management |
US20200120597A1 (en) * | 2018-10-16 | 2020-04-16 | Hewlett Packard Enterprise Development Lp | Access point wake up |
US10863432B2 (en) * | 2018-10-16 | 2020-12-08 | Hewlett Packard Enterprise Development Lp | Access point wake up |
US11564162B2 (en) * | 2018-10-16 | 2023-01-24 | Hewlett Packard Enterprise Development Lp | Access point wake up |
US11074207B1 (en) | 2020-01-29 | 2021-07-27 | Samsung Electronics Co., Ltd. | System-on-chips and methods of controlling reset of system-on-chips |
US11609874B2 (en) | 2020-01-29 | 2023-03-21 | Samsung Electronics Co., Ltd. | System-on-chips and methods of controlling reset of system-on-chips |
US12001362B2 (en) | 2020-08-17 | 2024-06-04 | Nokia Technologies Oy | Dynamically reprogrammable topologically unique integrated circuit identification |
Also Published As
Publication number | Publication date |
---|---|
EP3776225A1 (en) | 2021-02-17 |
JP7383631B2 (en) | 2023-11-20 |
KR102679562B1 (en) | 2024-07-01 |
US20220291730A1 (en) | 2022-09-15 |
JP2021519463A (en) | 2021-08-10 |
US20190303777A1 (en) | 2019-10-03 |
US11340671B2 (en) | 2022-05-24 |
US11914440B2 (en) | 2024-02-27 |
US20220214731A1 (en) | 2022-07-07 |
WO2019191431A1 (en) | 2019-10-03 |
US20190303778A1 (en) | 2019-10-03 |
EP3776225A4 (en) | 2022-01-05 |
JP2024020317A (en) | 2024-02-14 |
IL277567A (en) | 2020-11-30 |
KR20200139673A (en) | 2020-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11914440B2 (en) | Protocol level control for system on a chip (SoC) agent reset and power management | |
EP3776231B1 (en) | Procedures for implementing source based routing within an interconnect fabric on a system on chip | |
US7643477B2 (en) | Buffering data packets according to multiple flow control schemes | |
US9742662B2 (en) | Fabric discovery for a cluster of nodes | |
US6981025B1 (en) | Method and apparatus for ensuring scalable mastership during initialization of a system area network | |
US7046633B2 (en) | Router implemented with a gamma graph interconnection network | |
US7826460B2 (en) | Network-on-chip apparatus, and method for controlling dynamic frequency for the same | |
US5634015A (en) | Generic high bandwidth adapter providing data communications between diverse communication networks and computer system | |
US6947433B2 (en) | System and method for implementing source based and egress based virtual networks in an interconnection network | |
CN112035395B (en) | Handling tenant requirements in a system using acceleration components | |
US20100162265A1 (en) | System-On-A-Chip Employing A Network Of Nodes That Utilize Logical Channels And Logical Mux Channels For Communicating Messages Therebetween | |
US20100191814A1 (en) | System-On-A-Chip Employing A Network Of Nodes That Utilize Receive Side Flow Control Over Channels For Messages Communicated Therebetween | |
EP1779609B1 (en) | Integrated circuit and method for packet switching control | |
US20070133415A1 (en) | Method and apparatus for flow control initialization | |
EP2401683A1 (en) | Method and system for virtual machine networking | |
US20160308649A1 (en) | Providing Services in a System having a Hardware Acceleration Plane and a Software Plane | |
WO2003034689A1 (en) | Apparatus and method for allocating buffer space | |
GB2401518A (en) | Efficient arbitration using credit based flow control | |
US20230388251A1 (en) | Tightly-Coupled, Loosely Connected Heterogeneous Packet Based Transport | |
Vonnahme et al. | Dynamic reconfiguration of real-time network interfaces | |
Grammatikakis et al. | Chip-Level Communication Services | |
Obaidullah et al. | Reconfigurability of On-chip Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PROVINO TECHNOLOGIES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DESAI, SHAILENDRA;PEARCE, MARK;JAIN, AMIT;AND OTHERS;SIGNING DATES FROM 20190322 TO 20190326;REEL/FRAME:048750/0403 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVINO TECHNOLOGIES, INC.;REEL/FRAME:055920/0158 Effective date: 20210402 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |