Many printing devices include at least one fluid ejection device (e.g., print head) designed to house cartridges filled with fluid (e.g., ink or toner in the case of an inkjet printing device, or a detailing agent in the case of a three dimensional printing device). The fluid ejection devices further include at least one nozzle via which the fluid is dispensed from the cartridges onto a substrate (e.g., paper). When printing a document, the print engine controller of the printing device may send commands to the fluid ejection devices that control when the individual nozzles of the fluid ejection devices “fire” or dispense fluid.
In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific examples in which the disclosure may be practiced. It is to be understood that other examples may be utilized and structural or logical changes may be made without departing from the scope of the present disclosure. The following detailed description, therefore, is not to be taken in a limiting sense, and the scope of the present disclosure is defined by the appended claims. It is to be understood that features of the various examples described herein may be combined, in part or whole, with each other, unless specifically noted otherwise.
When printing a document, a print engine controller of a printing device may send commands in control data packets to the fluid ejection devices (e.g., print heads), via a data path, that control when the individual nozzles of the fluid ejection devices “fire” or dispense fluid (e.g., ink, toner in the case of an inkjet printing device, or a detailing agent in the case of a three dimensional printing device). For high-density print applications, the various nozzles may be grouped into a plurality of “primitives,” such that one nozzle in each primitive fires at any given time based on the data loaded from the print engine controller (e.g., one bit of data per primitive). For lower density print applications, a plurality of primitives may be combined to form a “virtual” primitive in which one nozzle in each virtual primitive fires at any given time (thus, some primitives in the virtual primitive may not fire any nozzles).
Some shift register fluid ejection implementations may allow the insertion of random data in the header of a control data packet. A variable number of random data bits may be added to the header. The random data bits may have no functional impact on real nozzle data and/or control word data, but can provide benefits such as identifying data integrity issues and effectively randomizing or dithering the fire period to spread the frequency of fire-related electromagnetic compatibility emissions. However, some fluid ejection device designs may not utilize a receiver that is compatible with random length headers. These fluid ejection device designs may not operate properly in systems where random length headers are utilized. For example, some fluid ejection device designs may utilize a different control word or datapath structure, so a remapping of bits within the data packet may be performed to provide compatibility. Such a remapping involves a capability to align to the random length header to determine the location of the true control word/data packet.
Some examples of the present disclosure are directed to a fluid ejection array controller interface that determines the location of random data within a control data packet. Alignment to the random length header allows removal of the random header and/or modification of the data packet (including the control word). Some examples of the present disclosure are directed to a fluid ejection array controller interface that removes randomly inserted bits from the header of a control data packet before the control data packet is provided to the fluid ejection device. Some examples disclosed herein allow a system defined for compatibility with a shift register fluid ejection implementation to be used with alternative fluid ejection devices (e.g., by removing the random header), or a system defined for a specific control word bit ordering (e.g., address bit locations) to be used with alternative fluid ejection devices (e.g., by modifying the control word data and/or bit mapping to rearrange the control word bits). Some examples provide a flexible system design for future, undefined fluid ejection architectures.
In one example, control data packets and an input clock signal are received by the fluid ejection array controller interface, and the randomly inserted bits are removed. The fluid ejection array controller interface buffers the modified control data packets without the randomly inserted bits. The fluid ejection array controller interface outputs the buffered modified control data packets to the fluid ejection device using an independent internal clock that is faster than or equal to the received input clock, which limits buffering of data to a single fire group of data at a time. The independent time base of the internal clock enables the interface to modify the clock timing and data burst length. One example of the fluid ejection array controller interface includes an input shift register, an output shift register, and an internal clock signal generator.
Although examples of the disclosure may be discussed within the context of inkjet printing, the techniques disclosed herein may be further applied to control the fluid ejection devices of three dimensional printing devices and other devices that eject fluid such as ink, toner, or the like, or detailing agents (e.g., binder materials, powders, or the like) used in additive manufacturing processes.
The fluid ejection array controller interface 104 receives control data packets 103 from print engine controller 102 for controlling ejection of fluid by the nozzles of the nozzle array 108. The interface 104 removes randomly inserted bits from the received control data packets 103 to create modified control data packets 105 with the randomly inserted bits removed, and outputs the modified control data packets 105 to the fluid ejection array controller 112. The fluid ejection array controller 112 generates ejection control data 113 for the nozzles of the nozzle array 108 (or, more specifically in some examples, for the virtual primitives of the nozzle array 108) based on the contents of the modified control data packets 105. A data path interconnects the print engine controller 102, the fluid ejection array controller interface 104, and the fluid ejection array controller 112, and transports the control data packets 103 and the modified control data packets 105. The data path may be a high-speed data path, such as a multi-lane serial bus.
In one example, the control data packets 103 are “fire pulse group” (or “FPG”) packets containing data about which nozzles of the fluid ejection device 106 should fire. For instance, the control data packets 103 may identify the primitives or virtual primitives containing the nozzles that are to fire, or the packets may contain bits of data for each primitive. One example of a fire pulse group is illustrated in further detail in
The fluid ejection array controller 112 may also generate a plurality of nozzle control bits based on the information contained in the modified control data packets 105. The nozzle control bits may include a combination of primitive data, address information, and a FIRE signal local to that primitive. A nozzle control bit instructs an addressed nozzle to fire. In one example, the fluid ejection array controller 112 generates one nozzle control bit for each primitive on the fluid ejection device 106. In one example, the fluid ejection array controller 112 populates the nozzle control bits with bit values (e.g., “0” or “1”) that indicate whether a nozzle identified by a corresponding address should fire or not. The fluid ejection array controller 112 may also convey address data to the primitives of the fluid ejection device 106. In one example, the address data identifies (e.g., by corresponding address) which nozzles within the primitives of the fluid ejection device 106 should be fired.
In one example, the fluid ejection array controller interface 104 is implemented as a device that is separate from the fluid ejection device 106 and is positioned between the print engine controller 102 and the fluid ejection device 106. In another example, the fluid ejection array controller interface 104 is integrated into the fluid ejection device 106, and may reside on a common semiconductor die with the fluid ejection array controller 112.
Random data 202 includes a random number of random data bits added to the front end of the control data packet 200 before the header 204. In one example, the random data 202 is generated by a pseudo-random number generator (PRNG), such as by using a linear feedback shift register approach. The length of the random data 202 (i.e., the number of random data bits included) and the values for the random data bits may both be determined by the PRNG. In one example, the random data 202, having a pseudo-random length, includes 0, 2, 4, 6, or 8 bits of pseudo-random data.
In one example, the header 204 includes bits that are used by the fluid ejection array controller 112 (
In one example, the set of address bits 206 identifies, for each primitive, an address (also referred to as an “embedded address”) corresponding to a nozzle to be fired (i.e., to fire the unique primitive data and eject fluid). In one example, the set of address bits 206 may be omitted from the control data packet 200; in this case, the address bits 206 may be generated by an address generator of the fluid ejection array controller 112.
In one example, the set of fire data bits 208 includes one nozzle's worth of data (e.g., unique primitive data) for each primitive on the fluid ejection device 106. The data included in the set of fire data bits 208 determines whether the nozzle that is identified by the set of address bits within a particular primitive should fire. For instance, the fire data bits 208 may include a non-null value (e.g., “1”) to indicate that a nozzle of a primitive should fire. The data included in the set of fire data bits 208 may be different for each primitive.
In one example, the footer 210 comprises bits that are used by the fluid ejection array controller 112 to detect the end of the control data packet 200. Thus, the footer 210 may include some predefined sequence of bits that indicates the end of a control data packet.
Once the control data packet 200 is loaded into the fluid ejection array controller 112, the information bits of data and address are then present at each primitive. It is at this time a fire signal is sent to all primitives (propagated from first to last primitive). This fire signal then generates nozzle control bits, which include a combination of primitive data, address information, and a FIRE signal local to that primitive. The nozzle control bits are then sent to the primitive groups on the fluid ejection device 106, and the primitive groups will fire the nozzles addressed by the nozzle control bits. To fire all of the nozzles on the fluid ejection device 106 in one fire pulse group, a virtual primitive control packet 200 would thus be loaded for every address value.
In one example, inputs 302, 304, and 306 are connected to a print engine controller (e.g., print engine controller 102), and outputs 316, 318, and 320 are connected to a fluid ejection array controller (e.g., fluid ejection array controller 112). In operation according to one example, a control data packet 402 is received in a serial manner by input shift register 308 via input 306. In one example, the input shift register 308 is a fixed-length shift register, with the length of the shift register being defined to be equal to the length of the real packet data (e.g., real packet data 420(1), 420(2), or 420(3)). This results in the random length header of random data (e.g., random data 418(2) or 418(3)) rolling off the end of the input shift register 308 and being discarded.
The retained real packet data in the input shift register 308 is parallel loaded to the output shift register 314 at the end of each packet. The real packet data in the output shift register 314 is serially driven to the fluid ejection device (e.g., fluid ejection device 106) via output 320. The output shift register 314 is clocked by an internal clock signal, clkshift_out, which is output from the shift register and fire control logic 310 via communication link 315. The internal clock signal, clkshift_out, is generated by the shift register and fire control logic 310 based on a clock signal provided by the clock signal generator 312. In one example, the internal clock signal, clkshift_out, is faster than the DCLKin signal 406. The input shift register 308 may continue loading input data while the output shift register 314 is simultaneously being utilized to re-drive real packet data.
The FIREin signal 408 received via input 302 is timed via an internal counter in shift register and fire control logic 310. The FIREout signal 416 output by shift register and fire control logic 310 via output 316 is delayed to the end of the DATA_xout packet) and re-driven to emulate the input timing (e.g., pulse widths, deadtime, etc.).
One example of the present disclosure is directed to a fluid ejection controller interface.
The fluid ejection controller interface 500 includes a clock signal generator 512 to generate a second clock signal 515 that is different than the first clock signal 504. The fluid ejection controller interface 500 includes output logic 514 to receive the modified control data packets 509, and output the modified control data packets 509 to a fluid ejection controller 518 of a fluid ejection device 516 based on the second clock signal 515.
The set of random bits for each control data packet 506 may have a pseudo-random length. Values for the set of random bits for each control data packet 506 may have pseudo-random number values. The second clock signal 514 may be faster than or equal to the first clock signal 504. The input logic 508 may comprise an input shift register, and the output logic 514 may comprise an output shift register. The input shift register and the output shift register may be fixed-length shift registers having the same length. The fluid ejection controller interface 500 may further include control logic to receive fire signals, and control the output logic. The fluid ejection controller interface 500 may be implemented separate from the fluid ejection device 516. The fluid ejection controller interface 500 may be integrated into the fluid ejection device 516. The fluid ejection controller interface 500 may reside on a common semiconductor die with the fluid ejection controller 518. The input logic may remove the random bits from the received control data packets 506 to facilitate the creation of the modified control data packets 509. The fluid ejection controller interface 500 may further include modification logic to modify at least one of positions or values of bits in the received control data packets to facilitate the creation of the modified control data packets.
Another example of the present disclosure is directed to a method of processing control data packets.
The set of random bits for each control data packet in method 600 may have a pseudo-random length, and the values for the set of random bits for each control data packet may be pseudo-random number values. The method 600 may further include receiving, by control logic, fire signals; and controlling, by the control logic, the output logic based on the received fire signals and the internal data clock signal. The method 600 may further include removing, by the input logic, the random bits from the received control data packets to facilitate the creation of the modified control data packets. The method 600 may further include modifying, by modification logic, at least one of positions or values of bits in the received control data packets to facilitate the creation of the modified control data packets.
Yet another example of the present disclosure is directed to an apparatus, which includes an input shift register to serially receive control data packets and an input data clock signal. Each control data packet includes a set of primitive data bits and a set of random bits. The set of random bits for each control data packet has a pseudo-random length. The apparatus includes modification logic to modify at least one of positions or values of bits in the received control data packets to facilitate the creation of the modified control data packets. The apparatus includes a clock signal generator to generate an internal data clock signal that is faster than or equal to the input data clock signal. The apparatus includes an output shift register to receive the modified control data packets, and output the modified control data packets to a fluid ejection controller of a fluid ejection device based on the input data clock signal.
The apparatus may further include control logic to receive fire signals and control the output shift register based on the received fire signals and the internal data clock signal. The input shift register may discard the random bits from the received control data packets to facilitate the creation of the modified control data packets.
In one example, inputs 702, 704, and 706 are connected to a print engine controller (e.g., print engine controller 102), and outputs 716, 718, and 720 are connected to a fluid ejection array controller (e.g., fluid ejection array controller 112). In operation according to one example, a control data packet 802 is received in a serial manner by input shift register 708 via input 706. In one example, the input shift register 708 is a fixed-length shift register, with the length of the shift register being defined to be equal to either the length of the real packet data (e.g., real packet data 820(1), 820(2), or 820(3)), or the length of the entire control data packet 802. For examples in which the input shift register 708 has a length that is equal to the length of the real packet data, the random length header of random data (e.g., random data 818(1), 818(2), or 818(3)) rolls off the end of the input shift register 708 and may be discarded.
The retained data in the input shift register 708 is parallel loaded to the output shift register 714 at the end of each packet. Rearrangement and modification logic 711 may include steering multiplexers to rearrange the bit ordering (e.g., to rearrange bits in the control word), and may include additional logic to apply additional modifications to bits within the control word (e.g., changing the values of particular bits). The data in the output shift register 714 is serially driven to the fluid ejection device (e.g., fluid ejection device 106) via output 720. The output shift register 714 is clocked by an internal clock signal, clkshift_out, which is output from the shift register and fire control logic 710 via communication link 715. The internal clock signal, clkshift_out, is generated by the shift register and fire control logic 710 based on a clock signal provided by the clock signal generator 712. In one example, the internal clock signal, clkshift_out, is faster than the DCLKin signal 806. The input shift register 708 may continue loading input data while the output shift register 714 is simultaneously being utilized to re-drive packet data. In examples in which random data is re-driven by interface 700, the shift register and fire control logic 710 may be used to count incoming data packet bits and clock out an equal number of bits from the output shift register 714.
The FIREin signal 808 received via input 702 is timed via an internal counter in shift register and fire control logic 710. The FIREout signal 816 output by shift register and fire control logic 710 via output 716 is delayed to the end of the DATA_xout packet) and re-driven to emulate the input timing (e.g., pulse widths, deadtime, etc.).
In the example shown in
Aspects of the present disclosure can be implemented by machine readable instructions and/or in a combination of machine readable instructions and hardware, e.g., using application specific integrated circuits (ASIC), a programmable logic array (PLA), including a field-programmable gate array (FPGA), or a state machine deployed on a hardware device, a general purpose computer or any other hardware equivalents, e.g., computer readable instructions pertaining to the method(s) discussed herein can be used to configure a hardware processor to perform the blocks, functions and/or operations of the disclosed methods.
Furthermore, when a hardware processor executes instructions to perform “operations”, this could include the hardware processor performing the operations directly and/or facilitating, directing, or cooperating with another hardware device or component, e.g., a co-processor and the like, to perform the operations. The processor executing the machine readable instructions relating to method(s) described herein can be perceived as a programmed processor or a specialized processor. As such, modules for controlling devices disclosed herein, including associated data structures, of the present disclosure can be stored on a tangible or physical (broadly non-transitory) computer-readable storage device or medium, e.g., volatile memory, non-volatile memory, ROM memory, RAM memory, magnetic or optical drive, device or diskette and the like. More specifically, the computer-readable storage device may comprise any physical devices that provide the ability to store information such as data and/or instructions to be accessed by a processor or a computing device such as a computer or an application server.
Although specific examples have been illustrated and described herein, a variety of alternate and/or equivalent implementations may be substituted for the specific examples shown and described without departing from the scope of the present disclosure. This application is intended to cover any adaptations or variations of the specific examples discussed herein. Therefore, it is intended that this disclosure be limited only by the claims and the equivalents thereof.
This application is a Continuation Application of U.S. National Stage application Ser. No. 16/769,396, filed Jun. 3, 2020, entitled “IDENTIFYING RANDOM BITS IN CONTROL DATA PACKETS”, which is a U.S. National Stage of PCT Application No. PCT/US2019/016739, filed Feb. 6, 2019, entitled “IDENTIFYING RANDOM BITS IN CONTROL DATA PACKETS”, both of which are incorporated herein.
Number | Name | Date | Kind |
---|---|---|---|
4026402 | Byrd | May 1977 | A |
4872028 | Lloyd | Oct 1989 | A |
5422662 | Fukushima et al. | Jun 1995 | A |
5541629 | Saunders et al. | Jul 1996 | A |
5751302 | Rezanka | May 1998 | A |
5917509 | Becerra et al. | Jun 1999 | A |
6176569 | Anderson et al. | Jan 2001 | B1 |
6302507 | Prakash et al. | Oct 2001 | B1 |
6547356 | Edelen | Apr 2003 | B2 |
6616256 | Cook et al. | Sep 2003 | B1 |
6698862 | Choi et al. | Mar 2004 | B1 |
7104624 | Schloeman et al. | Sep 2006 | B2 |
7159959 | Schremp | Jan 2007 | B2 |
7252353 | Silverbrook et al. | Aug 2007 | B2 |
7266661 | Walmsley | Sep 2007 | B2 |
7267417 | Silverbrook et al. | Sep 2007 | B2 |
7419236 | Masuda | Sep 2008 | B2 |
7578569 | Silverbrook | Aug 2009 | B2 |
7738137 | Graf et al. | Jun 2010 | B2 |
7758141 | Sakurai | Jul 2010 | B2 |
7832842 | Jackson Pulver et al. | Nov 2010 | B2 |
7866778 | Silverbrook et al. | Jan 2011 | B2 |
7976115 | Gibson et al. | Jul 2011 | B2 |
8199342 | Martin | Jun 2012 | B2 |
8348373 | Martin et al. | Jan 2013 | B2 |
8353567 | Banerjee et al. | Jan 2013 | B1 |
8556364 | Hoisington et al. | Oct 2013 | B2 |
8777364 | Carrobe et al. | Jul 2014 | B2 |
8864260 | Ge et al. | Oct 2014 | B1 |
9415585 | Goyen et al. | Aug 2016 | B1 |
9597894 | Buxton et al. | Mar 2017 | B2 |
9776395 | Anderson et al. | Oct 2017 | B2 |
11364719 | Gardner et al. | Jun 2022 | B2 |
11559985 | Linn et al. | Jan 2023 | B2 |
20030063297 | Dodd | Apr 2003 | A1 |
20040104973 | Huang et al. | Jun 2004 | A1 |
20040183842 | Kobayashi et al. | Sep 2004 | A1 |
20050110814 | Imai | May 2005 | A1 |
20050190217 | Wade et al. | Sep 2005 | A1 |
20050206944 | Walmsley | Sep 2005 | A1 |
20060092437 | Martin | May 2006 | A1 |
20060109296 | Shamoun et al. | May 2006 | A1 |
20060132518 | Jackson Pulver et al. | Jun 2006 | A1 |
20060139380 | Walmsley et al. | Jun 2006 | A1 |
20060181558 | Walmsley et al. | Aug 2006 | A1 |
20070095928 | Balinsky et al. | May 2007 | A1 |
20070126769 | Usui | Jun 2007 | A1 |
20070177169 | Han | Aug 2007 | A1 |
20070296743 | Sakurai | Dec 2007 | A1 |
20080123641 | Park | May 2008 | A1 |
20080303868 | Sakurai | Dec 2008 | A1 |
20090009545 | Takei et al. | Jan 2009 | A1 |
20090278879 | Takeuchi et al. | Nov 2009 | A1 |
20090278890 | Yamaguchi et al. | Nov 2009 | A1 |
20100124329 | Lyman | May 2010 | A1 |
20130063511 | Gardner et al. | Mar 2013 | A1 |
20130257949 | Qiu et al. | Oct 2013 | A1 |
20140078223 | Ohmura | Mar 2014 | A1 |
20140111570 | Nitta et al. | Apr 2014 | A1 |
20140320558 | Ge et al. | Oct 2014 | A1 |
20150124019 | Cruz-Uribe et al. | May 2015 | A1 |
20150266324 | Qu et al. | Sep 2015 | A1 |
20160089885 | Edelen et al. | Mar 2016 | A1 |
20170239944 | Martin et al. | Aug 2017 | A1 |
20170242633 | Martin et al. | Aug 2017 | A1 |
20170272231 | Chen | Sep 2017 | A1 |
20170320320 | Martin et al. | Nov 2017 | A1 |
20180050537 | Bakker et al. | Feb 2018 | A1 |
20180147839 | Ge et al. | May 2018 | A1 |
20180236761 | Taniguchi et al. | Aug 2018 | A1 |
20180236762 | Negishi et al. | Aug 2018 | A1 |
20180288276 | Sato et al. | Oct 2018 | A1 |
20190061347 | Bakker et al. | Feb 2019 | A1 |
20210206164 | Gardner et al. | Jul 2021 | A1 |
20210213731 | Linn et al. | Jul 2021 | A1 |
20210221120 | Linn et al. | Jul 2021 | A1 |
20210354453 | Martin et al. | Nov 2021 | A1 |
20210362494 | Gardner et al. | Nov 2021 | A1 |
Number | Date | Country |
---|---|---|
1727186 | Feb 2006 | CN |
1922019 | Feb 2007 | CN |
101092076 | Dec 2007 | CN |
101522428 | Sep 2009 | CN |
101574865 | Nov 2009 | CN |
103358701 | Oct 2013 | CN |
107073940 | Aug 2017 | CN |
107206816 | Sep 2017 | CN |
5570691 | Oct 2005 | CO |
7160043 | Jan 2015 | CO |
0972374 | Jan 2000 | EP |
1212197 | Jun 2002 | EP |
3892471 | Oct 2021 | EP |
2788140 | Oct 2020 | ES |
2885775 | Dec 2021 | ES |
2892033 | Feb 2022 | ES |
02-208052 | Aug 1990 | JP |
2004-282330 | Oct 2004 | JP |
2004-343468 | Dec 2004 | JP |
2005-205770 | Aug 2005 | JP |
2007-525342 | Sep 2007 | JP |
2009-292148 | Dec 2009 | JP |
2011-075387 | Apr 2011 | JP |
2016-032872 | Mar 2016 | JP |
2016-165822 | Sep 2016 | JP |
2018-505077 | Feb 2018 | JP |
10-0739789 | Jul 2007 | KR |
10-2017-0109239 | Sep 2017 | KR |
200533107 | Oct 2005 | TW |
201346749 | Nov 2013 | TW |
201601509 | Jan 2016 | TW |
9940702 | Aug 1999 | WO |
0110647 | Feb 2001 | WO |
2016089371 | Jun 2016 | WO |
2016130157 | Aug 2016 | WO |
2017180142 | Oct 2017 | WO |
2018071034 | Apr 2018 | WO |
2018080479 | May 2018 | WO |
2018080480 | May 2018 | WO |
2018190855 | Oct 2018 | WO |
2019009902 | Jan 2019 | WO |
2019017951 | Jan 2019 | WO |
2019195816 | Oct 2019 | WO |
Entry |
---|
“Four-Terminal Sensing.” Wikipedia: The Free Encyclopedia. Wikimedia Foundation Inc., retrieved at https://en.wikipedia.org/wiki/Four-terminal_sensing, Sep. 16, 2018, 3 pages. |
“What is a Kelvin connection and when should it be used?” retrieved at http://www.calibratorsinc.com/images/applications.pdf, Dated on or before Jan. 2019, 2 pages. |
Hewlett-Packard Development Company, L.P., Int. Appl. No. PCT/US2019/016735 entitled Issue Determinations Responsive to Measurments filed Feb. 6, 2019 (29 pages). |
Number | Date | Country | |
---|---|---|---|
20220349872 A1 | Nov 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16769395 | US | |
Child | 17865253 | US |