I. Field of the Disclosure
The technology of the disclosure relates generally to power saving techniques in computing devices.
II. Background
Computing devices are common within modem society. Ranging from small, mobile computing devices, such as a smart phone or tablet, to large server farms with numerous blades and memory banks, these devices are expected to communicate across myriad networks while providing various other base functions. While desktop devices and servers are generally immune to concerns about power consumption, mobile devices constantly struggle to find a proper balance between available functions and battery life. That is, as more functions are provided, power consumption increases, and battery life is shortened. Servers may likewise have power consumption concerns when assembled in large server farms.
Concurrent with power consumption concerns, improvements in network communications have increased data rates. For example, copper wires have been replaced with higher bandwidth fiber optic cables, and cellular networks have evolved from early Advanced Mobile Phone System (AMPS) and Global System for Mobile Communications (GSM) protocols to 4G and Long Term Evolution (LTE) protocols capable of supporting much higher data rates. As the data rates have increased, the need to be able to process these increased data rates within computing devices has also increased. Thus, earlier mobile computing devices may have had internal buses formed according to a High Speed Inter-Chip (HSIC) standard, universal serial bus (USB) standard (and particularly USB 2.0), or universal asynchronous receiver/transmitter (UART) standard. However, these buses do not support current data rates.
In response to the need for faster internal buses, the peripheral component interconnect express (PCIe) standard, as well as, later generations of USB (e.g., USB 3.0 and subsequent versions) have been adopted for some mobile computing devices. However, while PCIe and USB 3.0 can handle the high data rates currently being used, usage of such buses results in excessive power consumption and negatively impacts battery life by shortening the time between recharging events.
Aspects disclosed in the detailed description include power saving techniques in computing devices. In particular, as data is received by a modem processor in a computing device, the data is held until the expiration of a modem timer. The data is then passed to an application processor in the computing device over a peripheral component interconnect express (PCIe) interconnectivity bus. On receipt of the data from the modem processor, the application processor sends data held by the application processor to the modem processor over the PCIe interconnectivity bus. The application processor also has an uplink timer. If no data is received from the modem processor before expiration of the uplink timer, the application processor sends any collected data to the modem processor at expiration of the uplink timer. However, if data is received from the modem processor, the uplink timer is reset. By holding or accumulating the data at a source processor in this fashion, unnecessary transitions between low power states and active states on the PCIe bus are reduced and power is conserved.
In an alternate aspect, instead of initiating data transfer based on the expiration of the downlink timer (with or without expiration of the uplink timer), accumulated data transfer may be initiated based on expiration of just an uplink accumulation timer. The uplink accumulation timer may be within a host or a device associated with the interconnectivity bus.
In another alternate aspect, initiation of the data transfer may be based on reaching a predefined threshold for a byte accumulation limit counter. The byte accumulation limit counter is not mutually exclusive relative to the other counters and may operate as an override mechanism for one of the other accumulation timers. Use of such an override may be useful in situations where a sudden burst of data arrives that would exceed buffer space and/or bus bandwidth. Likewise, instead of a byte counter, a packet size counter or a “total number of packets” counter may be used to cover situations where numerous packets or a particularly large packet is delivered by the network.
In further aspects of the present disclosure, the timers may be overridden by other factors or parameters. Such an override is alluded to above with the byte accumulation limit counters and the total number of packets counter, which causes data transfers independently of the timers. Other parameters may also override the timers, such as the presence of low latency traffic (e.g., control messages), synchronizing the uplink and downlink data transfers, or low latency quality of service requirements. When such traffic is present, an interrupt or other command may be used to initiate data transfers before expiration of a timer. Still other factors may override the timers, such as an indication that a device or host is not in an automatic polling mode.
In this regard in one aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem timer. The mobile terminal also comprises a modem processor. The modem processor is configured to hold modem processor to application processor data until expiration of the modem timer. The mobile terminal also comprises an application processor. The mobile terminal also comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The application processor is configured to hold application processor to modem processor data until receipt of the modem processor to application processor data from the modem processor through the interconnectivity bus after which the application processor to modem processor data is sent to the modem processor through the interconnectivity bus.
In another aspect, a method of controlling power consumption in a computing device is disclosed. The method comprises holding data received by a modem processor from a remote network until expiration of a downlink timer. The method also comprises passing the data received by the modem processor to an application processor over an interconnectivity bus. The method also comprises holding application data generated by an application associated with the application processor for until receipt of the data from the modem processor or expiration of an uplink timer, whichever occurs first.
In another aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem processor. The mobile terminal also comprises an application timer. The mobile terminal also comprises an application processor. The application processor is configured to hold application processor to modem processor data until expiration of the application timer. The mobile terminal also comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The modem processor is configured to hold modem processor to application processor data until receipt of the application processor to modem processor data from the application processor through the interconnectivity bus after which the modem processor to application processor data is sent to the application processor through the interconnectivity bus.
In another aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem byte accumulation limit counter. The mobile terminal also comprises a modem processor. The modem processor is configured to hold modem processor to application processor data until a predefined threshold of bytes has been reached by the modem byte accumulation limit counter. The mobile terminal also comprises an application processor. The mobile terminal also comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The application processor is configured to hold application processor to modem processor data until receipt of the modem processor to application processor data from the modem processor through the interconnectivity bus after which the application processor to modem processor data is sent to the modem processor through the interconnectivity bus.
With regards to another aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem packet counter. The mobile terminal also comprises a modem processor. The modem processor is configured to hold modem processor to application processor data until a predefined threshold of packets has been reached by the modem packet counter. The mobile terminal also comprises an application processor. The mobile terminal also comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The application processor is configured to hold application processor to modem processor data until receipt of the modem processor to application processor data from the modem processor through the interconnectivity bus after which the application processor to modem processor data is sent to the modem processor through the interconnectivity bus.
In another aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem processor. The mobile terminal also comprises an application byte counter. The mobile terminal also comprises an application processor. The application processor is configured to hold application processor to modem processor data until a predefined threshold of bytes has been reached by the application byte counter. The mobile terminal also comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The modem processor is configured to hold modem processor to application processor data until receipt of the application processor to modem processor data from the application processor through the interconnectivity bus after which the modem processor to application processor data is sent to the application processor through the interconnectivity bus.
In another aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem processor and an application packet counter. The mobile terminal also comprises an application processor. The application processor is configured to hold application processor to modem processor data until a predefined threshold of packets has been reached by the application packet counter. The mobile terminal comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The modem processor is configured to hold the modem processor to application processor data until receipt of the application processor to modem processor data from the application processor through the interconnectivity bus after which the modem processor to application processor data is sent to the application processor through the interconnectivity bus.
With regards to another aspect, a method is disclosed. The method comprises starting an application timer at an application processor. The method also comprises accumulating data at the application processor until expiration of the application timer. The method comprises sending the accumulated data from the application processor to a modem processor across an interconnectivity bus. The method further comprises holding modem processor data at the modem processor until receipt of the accumulated data from the application processor.
In another aspect, a mobile terminal is disclosed. The mobile terminal comprises a modem timer. The mobile terminal also comprises a modem processor. The modem processor is configured to hold modem processor to application processor data until expiration of the modem timer. The mobile terminal also comprises an application processor. The mobile terminal also comprises an interconnectivity bus communicatively coupling the application processor to the modem processor. The application processor is configured to hold application processor to modem processor data until the modem processor pulls data from the application processor after transmission of the modem processor to application processor data.
With reference now to the drawing figures, several exemplary aspects of the present disclosure are described. The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any aspect described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects.
Aspects disclosed in the detailed description include power saving techniques in computing devices. In particular, as data is received by a modem processor in a computing device, the data is held until the expiration of a modem timer. The data is then passed to an application processor in the computing device over a peripheral component interconnect express (PCIe) interconnectivity bus. On receipt of the data from the modem processor, the application processor sends data held by the application processor to the modem processor over the PCIe interconnectivity bus. The application processor also has an uplink timer. If no data is received from the modem processor before expiration of the uplink timer, the application processor sends any collected data to the modem processor at expiration of the uplink timer. However, if data is received from the modem processor, the uplink timer is reset. By holding or accumulating the data at a source processor in this fashion, unnecessary transitions between low power states and active states on the PCIe bus are reduced and power is conserved.
In an alternate aspect, instead of initiating data transfer based on the expiration of the downlink timer (with or without expiration of the uplink timer), accumulated data transfer may be initiated based on expiration of just an uplink accumulation timer. The uplink accumulation timer may be within a host or a device associated with the interconnectivity bus.
In another alternate aspect, initiation of the data transfer may be based on reaching a predefined threshold for a byte accumulation limit counter. The byte accumulation limit counter is not mutually exclusive relative to the other counters and may operate as an override mechanism for one of the other accumulation timers. Use of such an override may be useful in situations where a sudden burst of data arrives that would exceed buffer space and/or bus bandwidth. Likewise, instead of a byte counter, a packet size counter or a “total number of packets” counter may be used to cover situations where numerous packets or a particularly a large packet is delivered by the network.
In further aspects of the present disclosure, the timers may be overridden by other factors or parameters. Such an override is alluded to above with the byte accumulation limit counters and the total number of packets counter, which causes data transfers independently of the timers. Other parameters may also override the timers, such as the presence of low latency traffic (e.g., control messages), synchronizing the uplink and downlink data transfers, or low latency quality of service requirements. When such traffic is present, an interrupt or other command may be used to initiate data transfers before expiration of a timer. Still other factors may override the timers, such as an indication that a device or host is not in an automatic polling mode.
While it is contemplated that the power saving techniques of the present disclosure are used in mobile terminals, such as smart phones or tablets, the present disclosure is not so limited. Accordingly,
In addition to the computing device 10, exemplary aspects of the present disclosure may also be implemented on a mobile terminal, which is a form of computing device as that term is used herein. In this regard, an exemplary aspect of a mobile terminal 22 is illustrated in
To effectuate functions, such as streaming video, data arrives from the remote antenna 24 at an antenna 30 of the mobile terminal 22, as illustrated in
A more detailed depiction of the components of the mobile terminal 22 is provided with reference to
The receiver path 38 receives information bearing radio frequency (RF) signals from one or more remote transmitters provided by a base station (e.g., the BS 26 of
With continued reference to
With continued reference to
In conventional mobile terminals that have a PCIe interconnectivity bus (i.e., the interconnectivity bus 36), the PCIe standard allows the interconnectivity bus 36 to be placed into a sleep mode. While placing the interconnectivity bus 36 in a sleep mode generally saves power, such sleep modes do have a drawback in that they consume relatively large amounts of power as they transition out of the sleep mode. This power consumption is exacerbated because of the asynchronous nature of the PCIe interconnectivity bus 36. That is, first data may arrive at the modem processor 44 for transmission to the application processor 34 at a time different than when the second data is ready to pass from the application processor 34 to the modem processor 44. This problem is not unique to the PCIe interconnectivity bus 36.
Exemplary aspects of the present disclosure reduce the number of transitions (i.e., 60, 62) from low power to active power by synchronizing packet transmission from the modem processor 44 and the application processor 34, which in turn allows the link to be maintained in a low power mode more efficiently since the communication on the link is consolidated to eliminate the second power state transition. In an exemplary aspect, the data (i.e., the modem data) from the modem processor 44 transmits first, and the data (i.e., the application data) from the application processor 34 is sent after arrival of the modem data and before the interconnectivity bus 36 can return to the low power state. The synchronization is done through the use of timers at the modem processor 44 and the application processor 34. The timers may be longer than a time slot 58 of the interconnectivity bus 36.
In a first exemplary aspect, the timer on the application processor 34 is longer than the timer on the modem processor 44. The accumulation may be done on a per logical channel basis. The timer may be configurable by the application processor 34 using a mechanism suitable to the interconnectivity bus 36. For example, on a fusion device using a modem host interface (MHI) over PCIe, the timer is maintained for every inbound MHI channel and the time value used by the timers shall be configured via a MHI command message or a PCIe memory mapped input/output (MMIO) device configuration register exposed via a base address register (BAR). The BAR is a PCIe standard defined mechanism by which a host maps the registers of a device into its virtual address map. For more information about MHI, the interested reader is referred to U.S. patent application Ser. No. 14/163,846, filed Jan. 24, 2013, which is herein incorporated by reference in its entirety. In other exemplary aspects, the timer on the modem processor 44 is longer than the timer on the application processor 34. In still other exemplary aspects, counters may be used in place of timers. The counters may be bit counters, packet counters, packet size counters, or the like. In other exemplary aspects, use of such alternate counters may be combined with the timers. In still other exemplary aspects, other override criteria may allow for data to be sent before timer or counter expiration so as to reduce latency and/or satisfy the quality of service requirements. The present disclosure steps through each of these aspects in turn, beginning with the situation where there are two timers, and the application processor 34 has a timer that is longer than the timer of the modem processor 44.
In this regard,
The mechanism for data transfer may be initiated and controlled by the modem processor 44 (i.e., the device). For example, on a fusion device using MHI over PCIe, the modem processor 44 may poll (read) the MHI channel Context Write Pointer to determine data buffers where downlink packets can be transferred. The application processor 34 updates the channel context data structure's Context Write Pointer field to point to the data transfer descriptors without ringing an Inbound channel doorbell. The modem processor 44 may poll for updates on the Context Write Pointer field as necessitated by downlink traffic. When the modem processor 44 runs out of buffers, i.e., a transfer ring is empty, and no buffers are present to transfer downlink data, the modem processor 44 may generate an event (e.g., an “out-of-buffer”) notification to the application processor 34, followed by an interrupt. Upon receiving the event notification from the modem processor 44, the application processor 34 shall provide data buffers by updating the channel Context Write Pointer and shall ring the Inbound channel doorbell.
After arrival of the modem data at the application processor 34, the application processor 34 releases any application data that has been held at the application processor 34 and resets the application timer (block 84). Note that the application timer can run on the modem processor 44 or the application processor 34. As an alternative, the modem processor 44 may continue to pull the uplink data 56 from the application processor 34 until it detects no further downlink data 54 activity. That is, the modem processor 44 may intersperse pulling the uplink data 56 while receiving the downlink data 54. If, however, no modem data is present at the modem processor 44 when the modem timer expires, the application timer continues (i.e., another millisecond) (block 86). At the expiration of the application timer, the application processor 34 sends any held data to the modem processor 44 through the interconnectivity bus 36 (block 88). The process then repeats by starting over (block 90).
As noted above, the uplink timer (i.e., the application timer) is, in an exemplary aspect, designed to be longer than the downlink timer (i.e., the modem timer) to increase the uplink/downlink synchronization whenever the downlink timer expires. While holding data for an extra time slot adds some latency, the brief amount added is readily absorbed by the application processor 34. Likewise, this latency is considered acceptable for the power savings. For example, by making the period of the modem timer twice the period of the time slot 58, the number of low power to active power transitions is potentially halved. Likewise, by making the period of the application timer six times the period of the time slot 58, the chance of being able to “piggyback” onto the active power state of the interconnectivity bus 36 caused by the modem data is increased, but still frequent enough that any uplink data 56 will still be sent in a timely fashion even if there is no downlink data 54 to trigger releasing the uplink data 56. Similar logic can be extended to synchronize traffic from multiple processors (e.g., multiple application processors or modem processors such as a second modem processor) over the data link. In an exemplary aspect, the other processors may each have timer values higher (i.e., longer) than that of the downlink timer, and the processors can exchange their data availability information so that traffic on one processor can trigger the data transfer on other processors if there is data available to transfer.
While it is conceivable that the uplink data 56 could be sent before the downlink data 54 (i.e., the application timer is shorter than the modem timer), such is generally not considered optimal because there are usually far more downlink packets than uplink packets. If this aspect is used, the application processor 34 may buffer uplink data packets into local memory prior to initiating transfer to the modem processor 44. These accumulated packets are controlled via an uplink accumulation timer. If there are plural channels, then a timer may be applied to each channel independently. When the application processor 34 is unable to use or does not have an uplink timer, the modem processor 44 may be able to instantiate an uplink timer, and upon expiry of the uplink timer, will poll data from the application processor 34. This exemplary aspect is explained in greater detail below with reference to
In this regard,
After arrival of the application data at the modem processor 44, the modem processor 44 releases any modem data that has been held at the modem processor 44 and resets the modem timer (block 124). Note that the application timer can run on the modem processor 44 or the application processor 34. Likewise, the modem timer can run on the modem processor 44 or the application processor 34.
With continued reference to
As noted above, in this exemplary aspect, the uplink timer (i.e., the application timer) is, in an exemplary aspect, designed to be shorter than the downlink timer (i.e., the modem timer). While holding data for an extra time slot 58 adds some latency, the brief amount added is readily absorbed by the application processor 34. Likewise, this latency is considered acceptable for the power savings. For example, by making the period of the application timer twice the period of the time slot 58, the number of low power to active power transitions is lowered. Likewise, by making the period of the modem timer six times the period of the time slot 58, the chance of being able to “piggyback” onto the active power state of the interconnectivity bus 36 caused by the application data is increased, but still frequent enough that any downlink data 54 will still be sent in a timely fashion even if there is no uplink data 56 to trigger releasing the downlink data 54. Similar logic can be extended to synchronize traffic from multiple processors over the data link. In an exemplary aspect, the other processors may each have timer values higher (i.e., longer) than that of the uplink timer and the processors can exchange their data availability information so that traffic on one processor can trigger the data transfer on other processors if there is data available to transfer.
In an exemplary aspect, the modem processor 44 may override and choose the minima from all configured values of each of the configurable parameters (like downlink or uplink accumulation timers, byte threshold, number of packets threshold, size of packet threshold, or the like) or downlink accumulation expiry timer values (e.g., from among the various channels) as the effective downlink accumulation timer expiry value. Intelligent modem processors 44 may also dynamically override or alter the downlink accumulation timer value depending on the downlink traffic pattern, and/or may adjust the downlink accumulation timer to achieve a desired quality of service (QoS) for data and/or to control traffic. A change of configuration can be triggered/controlled by the application processor 44 or any other processor in the system as well, via MHI control or QMI signaling (such as, for inter process signaling).
In addition to, or in place of, downlink and uplink timers, a byte accumulation limit counter may also be used by the modem processor 44 for downlink traffic and the application processor 34 for uplink traffic. This aspect may be advantageous in situations where there is a sudden burst of data pushed by the network or application. Note that this aspect is not mutually exclusive and may be implemented as an override mechanism for either downlink or uplink timers. For example, if the downlink accumulation timer is set relatively high to conserve power, a sudden burst of data may exceed the buffer capacity of the modem processor 44, or if allowed to accumulate in memory of the modem processor 44, this burst of data may exceed bus bandwidth allocations on the application processor 34. The application processor 34 can determine and configure the maximum byte accumulation limit based on its bus bandwidth budget, and/or buffer size reserved for downlink data transfer. The modem processor 44 can also choose an internal byte accumulation limit based on the size of downlink buffer, and/or interconnect link data throughput. With the byte accumulation limit counters, the modem processor 44 can initiate downlink data transfer to the application processor 34 prior to downlink accumulation timer expiry, if and when the buffered data size exceeds the byte accumulation limit counter. Since both the modem processor 44 and the application processor 34 may have independent recommendations for byte accumulation limit counter, the modem processor 44 may select the minima of these two values to be the effective byte accumulation limit. Similar parameters may be maintained in the application processor 34 to trigger the uplink data 56 transfer immediately (i.e., overriding the uplink accumulation timer).
Instead of, or in addition to the byte accumulation limit counter, a number of packets limit counter may be used. In an exemplary aspect, the packet number limit counter may be of similar design, and can be employed to add number of packet counter limits instead of byte limits to cover cases where a large number of packets are delivered by the network or an application. Again, such a packet limit counter may also be present or associated with the application processor 34 or the modem processor 44. Note, that the accumulation timers (uplink and/or downlink) and other configuration parameters like the number of accumulated packets threshold, accumulated bytes threshold, and the like, may be a function of LTE, HSPA, GERAN, or the like.
In still another exemplary aspect, the modem processor 44 or the application processor 34 may disable downlink or uplink accumulation in cases where there is a necessity to expedite message transfer, for example control messages (like flow control) or high QoS data traffic or low latency traffic, as determined by the modem processor 44 or the application processor 34. Latency introduced by accumulation may not be tolerable for these traffic classes.
Returning to the data accumulation based on amounts of data instead of a strict process,
With continued reference to
With continued reference to
While a byte counter may be effective in managing latency, another exemplary aspect uses a packet counter. In this regard,
With continued reference to
With continued reference to
A similar process may be used, where instead of determining if a particular number of bytes or packets have been accumulated, the control system evaluates a size of packets or whether the system is running low in memory. Likewise, it should be appreciated that certain priority data (e.g., a control signal or other data requiring low latency) may be associated with a flag or other indicator that overrides the timers and/or counters of the present disclosure.
As noted above, it should be appreciated that the aspects of the present disclosure are not mutually exclusive and can be combined. The combinations are myriad in that a timer may be used at the application processor 34 with a byte counter at the modem processor 44 (or vice versa), the modem processor 44 works with a timer and a byte counter, while the application processor 34 just has a timer, and so on. In this regard,
In this regard,
With continued reference to
With continued reference to
With reference to
With continued reference to
In another alternate aspect, there may be situations where the buffers of the application processor 34 may be full and there is no room for data from the modem processor 44. In such an event, the application processor 34 may so inform the modem processor 44, and the modem processor 44 may send an event to the application processor 34 to provide an interrupt signal to the modem processor 44 when there are free buffers.
With continued reference to
It should be appreciated that similar processes may be performed where both timers are in the application processor 34 or the modem processor 44 or are split between the respective processors 34, 44. Likewise, once a timer has expired, data can be pulled or pushed across the interconnectivity bus 36 based on polling, setting doorbell registers, or other technique.
Those of skill in the art will further appreciate that the various illustrative logical blocks, modules, circuits, and algorithms described in connection with the aspects disclosed herein may be implemented as electronic hardware, instructions stored in memory or in another computer-readable medium and executed by a processor or other processing device, or combinations of both. The devices described herein may be employed in any circuit, hardware component, IC, or IC chip, as examples. Memory disclosed herein may be any type and size of memory and may be configured to store any type of information desired. To clearly illustrate this interchangeability, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. How such functionality is implemented depends upon the particular application, design choices, and/or design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The various illustrative logical blocks, modules, and circuits described in connection with the aspects disclosed herein may be implemented or performed with a processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The aspects disclosed herein may be embodied in hardware and in instructions that are stored in hardware, and may reside, for example, in Random Access Memory (RAM), flash memory, Read Only Memory (ROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), registers, a hard disk, a removable disk, a CD-ROM, or any other form of computer readable medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a remote station. In the alternative, the processor and the storage medium may reside as discrete components in a remote station, base station, or server.
It is also noted that the operational steps described in any of the exemplary aspects herein are described to provide examples and discussion. The operations described may be performed in numerous different sequences other than the illustrated sequences. Furthermore, operations described in a single operational step may actually be performed in a number of different steps. Additionally, one or more operational steps discussed in the exemplary aspects may be combined. It is to be understood that the operational steps illustrated in the flow chart diagrams may be subject to numerous different modifications as will be readily apparent to one of skill in the art. Those of skill in the art will also understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the spirit or scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The present application claims priority to U.S. Provisional Patent Application Ser. No. 61/916,498 filed on Dec. 16, 2013 and entitled “POWER SAVING TECHNIQUES IN COMPUTING DEVICES,” which is incorporated herein by reference in its entirety. The present application also claims priority to U.S. Provisional Patent Application Ser. No. 62/019,073 filed on Jun. 30, 2014 and entitled “POWER SAVING TECHNIQUES IN COMPUTING DEVICES,” which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5167024 | Smith et al. | Nov 1992 | A |
5170470 | Pindar et al. | Dec 1992 | A |
5481747 | Kametani | Jan 1996 | A |
5619681 | Benhamida | Apr 1997 | A |
6021264 | Morita | Feb 2000 | A |
6085273 | Ball et al. | Jul 2000 | A |
6151355 | Vallee | Nov 2000 | A |
6182178 | Kelley et al. | Jan 2001 | B1 |
6272452 | Wu | Aug 2001 | B1 |
6472770 | Pohjola | Oct 2002 | B1 |
6765901 | Johnson | Jul 2004 | B1 |
6795877 | Glenn | Sep 2004 | B2 |
6972445 | Chang | Dec 2005 | B2 |
6996214 | Beck | Feb 2006 | B1 |
7058421 | Ngai et al. | Jun 2006 | B2 |
7103888 | Cayton et al. | Sep 2006 | B1 |
7136645 | Hanson et al. | Nov 2006 | B2 |
7137018 | Gutman et al. | Nov 2006 | B2 |
RE39427 | O'Sullivan | Dec 2006 | E |
7194642 | Pontarelli | Mar 2007 | B2 |
7206864 | Enko et al. | Apr 2007 | B2 |
7310535 | MacKenzie et al. | Dec 2007 | B1 |
7379475 | Minami et al. | May 2008 | B2 |
7424632 | Powers et al. | Sep 2008 | B2 |
7450963 | Krishnan et al. | Nov 2008 | B2 |
7475167 | Wunderlich et al. | Jan 2009 | B2 |
7535907 | Hussain et al. | May 2009 | B2 |
7542437 | Redi et al. | Jun 2009 | B1 |
7564860 | Wybenga et al. | Jul 2009 | B2 |
7603574 | Gyugyi et al. | Oct 2009 | B1 |
7610061 | Suh et al. | Oct 2009 | B2 |
7647517 | Tseng et al. | Jan 2010 | B2 |
7694049 | Goh et al. | Apr 2010 | B2 |
7702748 | Ramey | Apr 2010 | B2 |
7751442 | Chang et al. | Jul 2010 | B2 |
7765391 | Uemura et al. | Jul 2010 | B2 |
7785478 | Whitekettle et al. | Aug 2010 | B2 |
7796589 | Cohen et al. | Sep 2010 | B2 |
7831849 | Kwa et al. | Nov 2010 | B2 |
7852867 | Tsang et al. | Dec 2010 | B2 |
7898994 | Zhao et al. | Mar 2011 | B2 |
7899018 | Balasubramanian et al. | Mar 2011 | B2 |
8032181 | Hauck et al. | Oct 2011 | B2 |
8078768 | Manor et al. | Dec 2011 | B2 |
8112646 | Tsai | Feb 2012 | B2 |
8145920 | Tsai et al. | Mar 2012 | B2 |
8160000 | Balasubramanian | Apr 2012 | B2 |
8279790 | Wang et al. | Oct 2012 | B2 |
8281101 | Bains et al. | Oct 2012 | B2 |
8312307 | Hays | Nov 2012 | B2 |
8406725 | Plestid et al. | Mar 2013 | B2 |
8462684 | Kopikare et al. | Jun 2013 | B1 |
8495403 | Wang et al. | Jul 2013 | B2 |
8615671 | Robles et al. | Dec 2013 | B2 |
8635469 | Wang et al. | Jan 2014 | B2 |
8650427 | Knolla et al. | Feb 2014 | B2 |
8661167 | Hsin et al. | Feb 2014 | B2 |
8782456 | Tan et al. | Jul 2014 | B2 |
8838949 | Gupta et al. | Sep 2014 | B2 |
8839015 | Hays | Sep 2014 | B2 |
8938551 | Leucht-Roth | Jan 2015 | B2 |
8959265 | Hayut et al. | Feb 2015 | B2 |
8966302 | Sinha | Feb 2015 | B2 |
8972646 | Ranganathan et al. | Mar 2015 | B2 |
8996078 | Castor et al. | Mar 2015 | B2 |
9218290 | Sonnier et al. | Dec 2015 | B2 |
9226234 | Kalla | Dec 2015 | B2 |
9246846 | Fan et al. | Jan 2016 | B2 |
9264368 | Swarbrick et al. | Feb 2016 | B2 |
9311145 | Maciocco et al. | Apr 2016 | B2 |
9329671 | Heinrich | May 2016 | B2 |
9338279 | Kuehnel et al. | May 2016 | B2 |
9348523 | Busaba et al. | May 2016 | B2 |
9431077 | Shacham et al. | Aug 2016 | B2 |
9510242 | Delorme et al. | Nov 2016 | B2 |
9513662 | Chin et al. | Dec 2016 | B2 |
9535490 | Kaushik et al. | Jan 2017 | B2 |
9578676 | Zheng et al. | Feb 2017 | B2 |
20030114186 | Goetz | Jun 2003 | A1 |
20040004964 | Lakshmanamurthy et al. | Jan 2004 | A1 |
20040225760 | Lee | Nov 2004 | A1 |
20040264396 | Ginzburg et al. | Dec 2004 | A1 |
20050060365 | Robinson et al. | Mar 2005 | A1 |
20050165985 | Vangal et al. | Jul 2005 | A1 |
20050203917 | Freeberg et al. | Sep 2005 | A1 |
20060154642 | Scannell, Jr. | Jul 2006 | A1 |
20060161707 | Davies et al. | Jul 2006 | A1 |
20060195706 | Burchard et al. | Aug 2006 | A1 |
20060288209 | Vogler | Dec 2006 | A1 |
20070136264 | Tran | Jun 2007 | A1 |
20070140199 | Zhao et al. | Jun 2007 | A1 |
20070259673 | Willars et al. | Nov 2007 | A1 |
20080034106 | Bakshi et al. | Feb 2008 | A1 |
20080046665 | Kim | Feb 2008 | A1 |
20080101446 | Gautier et al. | May 2008 | A1 |
20090029735 | Nakagwa et al. | Jan 2009 | A1 |
20090039034 | Whitekettle et al. | Feb 2009 | A1 |
20090132582 | Kim et al. | May 2009 | A1 |
20090164821 | Drescher | Jun 2009 | A1 |
20090185487 | Adar et al. | Jul 2009 | A1 |
20090203409 | Castor et al. | Aug 2009 | A1 |
20090249041 | Damaraju et al. | Oct 2009 | A1 |
20090323686 | Dyck et al. | Dec 2009 | A1 |
20110010480 | Auernhammer | Jan 2011 | A1 |
20110013353 | Kwon et al. | Jan 2011 | A1 |
20110145445 | Malamant et al. | Jun 2011 | A1 |
20110154475 | Wu | Jun 2011 | A1 |
20120077464 | Nair et al. | Mar 2012 | A1 |
20120120860 | Chui et al. | May 2012 | A1 |
20130100787 | Fujiune | Apr 2013 | A1 |
20130198538 | Diab et al. | Aug 2013 | A1 |
20130204962 | Estevez et al. | Aug 2013 | A1 |
20130238915 | Kashikar | Sep 2013 | A1 |
20140068354 | Park et al. | Mar 2014 | A1 |
20140157009 | Kherani | Jun 2014 | A1 |
20140207991 | Kaushik et al. | Jul 2014 | A1 |
20140344429 | Baumann et al. | Nov 2014 | A1 |
20150086064 | Froemel | Mar 2015 | A1 |
20150169037 | Kaushik et al. | Jun 2015 | A1 |
20150212564 | Min et al. | Jul 2015 | A1 |
20160164990 | Zhang et al. | Jun 2016 | A1 |
20160226530 | Hayem et al. | Aug 2016 | A1 |
20160309365 | Runeson | Oct 2016 | A1 |
20160314055 | Bagchi et al. | Oct 2016 | A1 |
Number | Date | Country |
---|---|---|
101615067 | Dec 2009 | CN |
101802753 | Aug 2010 | CN |
102124454 | Jul 2011 | CN |
102204363 | Sep 2011 | CN |
103077141 | May 2013 | CN |
103168498 | Jun 2013 | CN |
103270466 | Aug 2013 | CN |
103314620 | Sep 2013 | CN |
0534529 | Mar 1993 | EP |
0475282 | Dec 1998 | EP |
1653331 | May 2006 | EP |
2640136 | Sep 2013 | EP |
2876945 | May 2015 | EP |
2003087338 | Mar 2003 | JP |
20030082724 | Oct 2003 | KR |
20050023262 | Mar 2005 | KR |
20090006183 | Jan 2009 | KR |
20110106368 | Sep 2011 | KR |
201011553 | Mar 2010 | TW |
201015289 | Apr 2010 | TW |
201329695 | Jul 2013 | TW |
0052585 | Sep 2000 | WO |
2004040796 | May 2004 | WO |
2005074611 | Aug 2005 | WO |
2007074343 | Jul 2007 | WO |
2007146549 | Dec 2007 | WO |
2008054974 | May 2008 | WO |
2009039034 | Mar 2009 | WO |
2009122380 | Oct 2009 | WO |
2010022368 | Feb 2010 | WO |
2010030768 | Mar 2010 | WO |
2010125429 | Nov 2010 | WO |
2012083486 | Jun 2012 | WO |
2012128793 | Sep 2012 | WO |
2014088862 | Jun 2014 | WO |
2014165346 | Oct 2014 | WO |
Entry |
---|
Black D., “Intel Reveals XMM 7260, XMM 7160, & M.2 4G LTE Modems,” Feb. 24, 2014, https://www.tomshardware.com/news/intel-4g-lte-advanced-modems,26115.html, 4 pages. |
Blickenstorfer C.H., “Semi-Rugged Notebook with Super Hi-Res Display and Touch Screen Option”, Rugged PC Review, Sep. 25, 2012, pp. 1-2. |
Bolla R., et al., “Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play”, May 2013, DOI:10.1007/978-3-642-38082-2_26, 14 Pages. |
Bontu C., et al., “DRX Mechanism for Power Saving in LTE,” IEEE Communications Magazine, IEEE Service Center, Piscataway, US, vol. 47 (6), Jun. 1, 2009 (Jun. 1, 2009), pp. 48-55, XP011281824, ISSN: 0163-6804, DOI: DOI:10.1109/MCOM.2009.5116800. |
Budruk R., et al., “PCI Express System Architecture”, Addison-Wesley, US, Sep. 4, 2003, XP007901254, 48 pages. |
Business Wire: “Panasonic Upgrades Fully-Rugged Toughbook® 19 Convertible Tablet PC, Faster Processor and Expanded Storage Increases Productivity for Mobile Workers in Extreme Environments,” Sep. 4, 2012, https://www.businesswire.com/news/home/20120904005579/en/Panasonic-Upgrades-Fully-Rugged-Toughbook%C2%AE-19-Convertible-Tablet-PC, 3 pages. |
Christensen, K., et al., “IEEE 802.3az: The Road to Energy Efficient Ethernet,” IEEE Communications Magazine, vol. 48, No. 11, Dec. 2010, pp. 50-56. |
Cinterion, “AN32: Integrating USB into GSM Applications,” Version 04, Sep. 16, 2008, Cinterion Wireless Modules, 19 pages. |
MIPI Alliance, “PCI-SIG and MIPI Alliance Announce Mobile PCIe (M-PCIe) Specification,” Feb. 28, 2013, https://www.mipi.org/content/pci-sig-and-mipi-alliance-announce-mobile-pcie--m-pcie-specification, 2 pages. |
Mostowfi, M., “Packet Coalescing and Server Substitution for Energy-Proportional Operation of Network Links and Data Servers,” Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy, University of South Florida, Jan. 2013, 132 pages. |
Dell, “Dell XPS 14z Owner's Manual,” 2011, Dell Inc., 74 pages. |
US International Trade Commission, Investigation No. 337-TA-1065, In the Matter of Certain Mobile Electric Devices and Radio Frequency and Processing Components Thereof, Notice of the Commission's Final Determination Finding No Violation of Section 337, Termination of the Investigation, Mar. 26, 2019, 4 pages. |
United States District Court Southern District Of California, Qualcomm Incorporated, Plaintiff, v. Apple Inc., Defendant, Verdict Form, Case No. 3:17-cv-1375-DMS-MDD, Mar. 15, 2019, 5 pages. |
Flajslik M., et al., “Network Interface Design for Low Latency Request-Response Protocols,” 2013 Usenix Annual Technical Conference (Usenix ATC '13), Jun. 26-28, 2013, San Jose, CA, pp. 333-345. |
PCI SIG: “PCI Express Base Specification Revision 3.0,” TLP Prefixes, Nov. 10, 2010 (Nov. 10, 2010), XP055586750, Retrieved from the Internet: URL: http://pcisig.com/ [retrieved on May 8, 2019], 7 pages. |
Hepp, C., “Review Asus UX32A-R3001V Ultrabook,” Notebook Check, Sep. 21, 2012, https://www.notebookcheck.net/Review-Asus-UX32A-R3001V-Ultrabook.82014.0.html, 16 pages. |
HP, “HP Pavilion G6 Notebook PC Maintenance and Service Guide,” 2012, Hewlett-Packard Development Company, L.P., 126 Pages. |
HP, “HP Pavilion G7 Notebook PC Maintenance and Service Guide,” 2011, Hewlett-Packard Development Company, L.P., 134 Pages. |
Sierra Wireless, “Sierra Wireless AirPrime® Embedded Wireless Modules EM Series”, 2014, Sierra Wireless, Inc., www.sierrawireless.com, 2 pages. |
PCI-SIG, “PCI-SIG and MIPI Alliance Collaborate to Extend PCI Express Technology to Mobile Devices,” Sep. 17, 2012, 2 pages. |
Intel, “Energy-Efficient Platforms,” White Paper, Designing Devices Using the New Power Management Extensions for Interconnects, Jul. 2009, Intel Corporation, pp. 1-38. |
PCI-SIG, “Resizable BAR Capability,” PCI-SIG Engineering Change Notice, Jan. 22, 2008, 9 pages. |
Piltch A., “Dell Latitude E6420 Review,” Laptop Mag, Apr. 17, 2011, https://www.laptopmag.com/reviews/laptops/dell-latitude-e6420, 14 pages. |
QuickSpecs, “HP Mobile Broadband Modules Overview of ESM76AA, H4X00AA, H6F23AA, ESM74AA, H4J87AA, QC431AA, WD301AA and ESM75AA”, Aug. 2, 2013, 10 pages. |
QuickSpecs, “HP Mobile Broadband Modules Overview of QC430AA, QC431AA, and WD301AA”, Nov. 3, 2011, 4 pages. |
MIPI Alliance, “MIPI® Alliance Boosts Specifications for Camera and Transport Layers in Mobile Device Applications,” Feb. 27, 2013, https://www.mipi.org/content/mipi%C2%AE-alliance-boosts-specifications-camera-and-transport-layers-mobile-device-applications, 2 pages. |
Intel Product Brief: “Intel Centrino Advanced-N 6230”, 2010, 4 Pages. |
Intel Product Brief: “Intel Dual Band Wireless-AC 7260”, 2013, 2 Pages. |
Intel Product Brief: “Intel Dual Band Wireless-AC 7260”, 2014, 2 Pages. |
Intel Product Brief: “Intel Ethernet Server Adapter I210”, 2012, 5 Pages. |
Intel Product Brief: “Intel Wireless-N 7260”, 2013, 2 Pages. |
QuickSpecs, “HP Mobile Broadband Modules Overview of QC431AA, H4X00AA, WD301AA, H6F23AA, H4J87AA, E5M76AA, E5M75AA, and E5M74AA”, Version 20, Apr. 15, 2014, pp. 1-10. |
Rubin M., et al., “Which Mobile Protocol is Ideal for your Next Generation Design?” EDN, Jul. 30, 2013, pp. 1-4. |
Tseng D., et al., “Low-Power, Dual-Port Solves Inter-Processor Communication Problem in Next-Generation Handsets”, Designlines, May 15, 2006, https://www.eetimes.com/low-power-dual-port-solves-inter-processor-communication-problem-in-next-generation-handsets/#, 5 pages. |
Jelasity, M., et al., “Gossip-Based Aggregation in Large Dynamic Networks,” ACM Transactions on Computer Systems, vol. 23, Issue 3, Aug. 2005, ACM, pp. 219-252. |
Jimeno M., et al., “A Network Connection Proxy to Enable Hosts to Sleep and Save Energy” 2008 IEEE International Performance, Computing and Communications Conference, Dec. 7-9, 2008, Austin, TX, USA, IEEE, pp. 101-110. |
Kim, S-Y., et al., “High-Performance Low Power Application Processor Integrated with Modem Processor,” 2013 International SoC Design Conference (ISOCC), Nov. 17-19, 2013, Busan, South Korea, IEEE, pp. 237-240. |
Klug B., “Intel Talks about Multimode LTE Modem—XMM7160 and Beyond,” AnandTech, Aug. 20, 2013, https://www.anandtech.com/show/7234/intel-talks-about-multimode-lte-modems-xmm7160-and-beyond, 7 pages. |
Lee, S. et al., “Clack: Cross-Layer ACK-Aided Opportunistic Transmission in Wireless Networks,” Wireless Personal Communications: An International Journal, vol. 72, Issue 1, Jan. 19, 2013, pp. 15-34. |
Leens, F., “An Introduction to I2C and SPI Protocols,” IEEE Instrumentation & Measurement Magazine, vol. 12, Issue 1, Jan. 2009, 6 pages. |
Lenovo, “The Lenovo Thinkpad W530 Notebook,” Product Datasheet, 2012, Lenovo, 4 pages. |
Lenovo, “The Lenovo Thinkpad X230 Notebook,” Product Datasheet, 2012, Lenovo, 4 pages. |
Li, R., et al., “CuSora: Real-Time Software Radio Using Multi-Core Graphics Processing Unit,” Journal of Systems Architecture, vol. 60, Mar. 2014, ACM, pp. 280-292. |
PCI Express, “PCI Bus Power Management Interface Specification Rev. 1.0”, Mar. 18, 1997. |
Smith S.L., “Dell XPS 14z Review,” LapTop Mag, Oct. 24, 2011, 13 pages. |
PCI Express, “PCI Express Base Specification Revision 2.1”, Mar. 4, 2009, 704 pages. |
Apple, Inc., “Respondent Apple Inc.'s Notice of Prior Art,” In the Matter of Certain Mobile Electronic Devices and Radio Frequency and Processing Components Thereof, United States International Trade Commission Investigation No. 337-TA-1065, Oct. 23, 2017, 155 pages. |
IPR Final Written Decision, Intel Corporation v. Qualcomm Incorporated, IPR2018-01261, Paper 30 (PTAB, Jan. 9, 2020). |
Ajanovic J., “PCI Express (TM) Architecture Advanced Protocols & Features PCI Express (TM) Architecture Advanced Protocols & Features,” Dec. 31, 2003 (Dec. 31, 2003), XP055172048, PCI-SIG Developers Conference Retrieved from the Internet URL: https://www.pcisig.com/developers/main/training_materials/get_document?doc_id=f275ada7d622d20947d69cbb34b6e0a0622249c3 [retrieved on Feb. 25, 2015] slides 23-28, 49 pages. |
Author Unknown, “IEEE Standard Microcontroller System Serial Control Bus,” IEEE Std 1118-1990, 1991, Institute of Electrical and Electronics Engineers, Inc., 252 pages. |
Betker M.R., et al., “The History of the Microprocessor,” Bell Labs Technical Journal, vol. 2, Issue 4, Autumn 1997, pp. 29-56. |
Author Unknown,“IEEE Standard for Information technology—Telecommunications and information exchange between systemsLocal and metropolitan area networks—Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Std 802.11™-2012, Mar. 29, 2012, IEEE Computer Society, 2793 pages. |
Culler, D. et al., “Parallel Computer Architecture: A Hardware/Software Approach,” Morgan Kaufmann, 1999, 877 pages. |
Downing, D. et al., “Dictionary of Computer and Internet Terms,” Eleventh Edition, 2013, Barron's Educational Series, pp. 396-397. |
Duan, Z., et al., “Push vs Pull: Implications of Protocol Design on Controlling Unwanted Traffic,” Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI'05), Jul. 2005, Cambridge, MA, 4 pages. |
Extended European Search Report for European Patent Application No. 18160829.0, dated Jun. 27, 2018, 11 pages. |
Extended European Search Report for European Patent Application No. 19154607.6, dated Jun. 26, 2019, 10 pages. |
Extended European Search Report for European Patent Application No. 19162655.5, dated May 31, 2019, 8 pages. |
Gerber, A., et al., “P2P, the Gorilla in the Cable,” Proceedings of National Cable & Telecommunications Association (NCTA), Jun. 2003, Chicago, IL, 13 pages. |
Gupta M., et al., “Using Low-Power Modes for Energy Conservation in Ethernet LANs,” 26th IEEE International Conference on Computer Communications, May 6-12, 2007, Anchorage, AK, USA, 5 pages. |
Halperin, D., et al., “Demystifying 802.11n Power Consumption,” HotPower'10: Proceedings of the 2010 International Conference on Power Aware Computing and Systems, Oct. 2010, 5 pages. |
Chen, Y. et al., “Power Management for VoIP over IEEE 802.11 WLAN” Wireless Communications And Networking Conference (WCNC 2004), Mar. 2004, IEEE Communications Society, pp. 1648-1653. |
Houghton Mifflin Company, “The American Heritage College Dictionary,” Third Edition, 2000, p. 1444. |
Kong, K., “Introduction to the PES32NT24G2 PCI Express Switch Features,” Application Note AN-713, IDT, Sep. 10, 2009, Renesas Electronics Corporation, 13 pages. |
Kwa, S. et al., “PCI Express Architecture Power Management,” Rev 1.1, White Paper, Nov. 8, 2002, Intel Corporation, 15 pages. |
Intel, “The BitBus Interconnect Serial Bus Control Specification,” Intel Corporation, 1988, 51 pages. |
International Preliminary Report on Patentability for PCT/US2014/070368, dated Apr. 1, 2016, 33 pages. |
International Search Report and Written Opinion for PCT/US2014/070368, dated Mar. 5, 2015, 14 pages. |
Kamath, S., et al., “Application Note AN092—Measuring Bluetooth Low Energy Power Consumption,” Revision SWRA347A, Apr. 13, 2012, Texas Instruments, 24 pages. |
Kaplan, S.M., “Wiley Electrical and Electronics Engineering Dictionary,” 2004, John Wiley & Sons, Inc., pp. 611-615. |
Kolbehdari, M. et al., “The Emergence of PCI Express in the Next Generation of Mobile Platforms,” Intel Technology Journal, vol. 9, Issue 1, 2005, pp. 21-34. |
Kravets, R. et al., “Application-driven power management for mobile communication,” Wireless Networks, vol. 6, 2000, J.C. Baltzer AG, Science Publishers, pp. 263-277. |
Merriam-Webster, “Merriam-Webster's Collegiate Dictionary,” Eleventh Edition, 2000, Merriam-Webster, Inc., p. 1337. |
Motorola, “HC11—MC68HC11PH8/MC68HC7 11PH8 Technical Data,” Motorola Ltd., Jun. 1997, 264 pages. |
Pakin, S., et at., “Fast Messages: Efficient, Portable Communication for Workstation Clusters and MPPs,” IEEE Concurrency, vol. 5, Issue 2, Apr.-Jun. 1997, pp. 60-73. |
Panda P.R., et al., “On-Chip vs Off-Chip Memory: The Data Partitioning Problem in Embedded Processor-Based Systems,” ACM Transactions on Design Automation of Electronic Systems, vol. 5, No. 3, Jul. 2000, pp. 682-704. |
Author Unknown, “PCI Bus Power Management Interface Specification,” Revision 1.2, Mar. 3, 2004, PCI-SIG, 74 pages. |
Author Unknown, “PCI Express 2.0 Base Specification,” Revision 0.9, Sep. 11, 2006, PCI-SIG, 632 pages. |
Author Unknown, “Core System Package [Low Energy Controller volume,]” Specification vol. 6: Specification of the Bluetooth System, Version 4.0, Jun. 30, 2010, Retrieved from the Internet: URL:www.bluetooth.com [retrieved on Jan. 12, 2012], 136 pages. |
Saade J., et al., “A System-Level Overview and Comparison of Three High-Speed Serial Links: USB 3.0, PCI Express 2.0 and LLI 1.0,” IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), Apr. 2013, IEEE, pp. 147-152. |
Saar, H. et al., “The MIPI M-PHY Reduces Power In Mobile Chip-To-ChipInterfaces,” Electronic Design, May 6, 2013, http://electronicdesign.com/print/power/mipi-m-phy-reduces-power-mobile-chip-chip-interfaces, 7 pages. |
Second Written Opinion from International Application No. PCT/US2014/070368, dated Nov. 9, 2015, 5 pp. |
Soanes, C., et al., “Concise Oxford English Dictionary,” Eleventh Edition, 2004, Oxford University Press, p. 1541. |
Stabley, Z., et al., “Intel I350 Ethernet Controller and DMA Coalescing,” White Paper, Intel® Power Management & I350 Ethernet Controller, 2011, Intel Corporation, 6 pages. |
Sullivan, M.J. et al., “Intel® Xeon® Processor C5500/C3500 Series Non-Transparent Bridge,” Intel® Xeon® Processor C5500/C3500 Series Non-Transparent Bridge, White Paper, Jan. 2010, Document No. 323328-001, Intel Corporation, 28 pages. |
Search Report for Taiwanese Patent Application No. 103143714, completed Mar. 20, 2017, 1 page. |
Search Report for Taiwanese Patent Application No. 106132793, completed Dec. 6, 2018, 1 page. |
Search Report for Taiwanese Patent Application No. 108129291, completed Feb. 7, 2020, 1 page. |
Search Report for Taiwanese Patent Application No. 109127729, completed Feb. 2, 2021, 1 page. |
Wang, R., et al., “Reducing Power Consumption for Mobile Platforms via Adaptive Traffic Coalescing,” IEEE Journal on Selected Areas in Communications, vol. 29, Issue 8, Sep. 2011, IEEE, pp. 1618-1629. |
Wilen, A. et al., “Introduction to PCI Express: A Hardware and Software Developer's Guide,” Intel Press, 2003, Intel Corporation, 308 pages. |
Xiao Y., et al., “IEEE 802.11 Performance Enhancement via Concatenation and Piggyback Mechanisms,” IEEE Transactions on Wireless Communications, vol. 4, No. 5, Sep. 2005, pp. 2182-2192. |
Yoshida, Y. et al., “A 4320MIPS Four-Processor Core SMP/AMP with Individually Managed Clock Frequency for Low Power Consumption,” 2007 IEEE International Solid-State Circuits Conference Digest of Technical Papers, Feb. 11-15, 2007, San Francisco, CA, USA, IEEE, 3 pages. |
Heart, F.E., et al., “A new minicomputer/ multiprocessor for the ARPA network,” AFIPS '73: Proceedings of the National Computer Conference and Exposition, Jun. 4-8, 1973, pp. 529-537. |
ITC, “Commision Opinion,” In the matter of Certain Mobile Electronic Devices and Radion Frequency and Processing Components Thereof, ITC-337-TA-1065, United States International Trade Commision, Apr. 5, 2019, 57 pages. |
Adams, G., et al., “Design Motivations for Multiple Processor Microcomputer Systems,” Computer Design, vol. 17, No. 3, Mar. 1978, pp. 81-89. |
U.S. Court of Appeals for the Federal Circuit, “Judgement,” Qualcomm Incorporated, Appellant v. Intel Corporation, Appellee, Andrew Hirshfeld, Performing the Functions and Duties of the Under Secretary of Commerce for Intellectual Property and Director of the U .S. Patent and Trademark Office, Intervenor, Case 2020-1574; Appeal from the U.S. Patent and Trademark Office, Patent Trial and Appeal Board in Nos. IPR2018-01261, IPR2018-01293, PR2018-01295, IPR2018-01344, IPR2018-01346, Mar. 2, 2021, 2 pages. |
Co-Pending U.S. Appl. No. 17/387,544, inventor Kaushik; Vinod, filed Jul. 28, 2021. |
Second Written Opinion for PCT/US2014/070368, mailed Nov. 9, 2015, 5 pages. |
Ajanovic, J ., “PCI Express™ Architecture Advanced Protocols & Features,” Dec. 31, 2003, PCI-SIG Developers Conference, retrieved Feb. 25, 2015 from https://www.pcisig.com/developers/main/training_materials/get_document?doc_id=f275ada7d622d20947d69cbb34b6e0a0622249c3, 49 pages. |
International Search Report and Written Opinion for PCT/US2014/070368, mailed Mar. 5, 2015, 14 pages. |
International Preliminary Report on Patentability for PCT/US2014/070368, mailed Apr. 1, 2016, 33 pages. |
Number | Date | Country | |
---|---|---|---|
62019073 | Jun 2014 | US | |
61916498 | Dec 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14568694 | Dec 2014 | US |
Child | 17240496 | US |