1. Field of the Invention
The field of the invention is data processing, or, more specifically apparatus and methods for data processing with a network on chip (‘NOC’).
2. Description of Related Art
There are two widely used paradigms of data processing; multiple instructions, multiple data (‘MIMD’) and single instruction, multiple data (‘SIMD’). In MIMD processing, a computer program is typically characterized as one or more threads of execution operating more or less independently, each requiring fast random access to large quantities of shared memory. MIMD is a data processing paradigm optimized for the particular classes of programs that fit it, including, for example, word processors, spreadsheets, database managers, many forms of telecommunications such as browsers, for example, and so on.
SIMD is characterized by a single program running simultaneously in parallel on many processors, each instance of the program operating in the same way but on separate items of data. SIMD is a data processing paradigm that is optimized for the particular classes of applications that fit it, including, for example, many forms of digital signal processing, vector processing, and so on.
There is another class of applications, however, including many real-world simulation programs, for example, for which neither pure SIMD nor pure MIMD data processing is optimized. That class of applications includes applications that benefit from parallel processing and also require fast random access to shared memory. For that class of programs, a pure MIMD system will not provide a high degree of parallelism and a pure SIMD system will not provide fast random access to main memory stores.
Methods, apparatus, and computer program products for a network on chip (‘NOC’) that shares memory in a software pipeline and includes integrated processor (‘IP’) blocks, routers, memory communications controllers, and network interface controllers, with each IP block adapted to a router through a memory communications controller and a network interface controller, where each memory communications controller controlling communications between an IP block and memory, and each network interface controller controlling inter-IP block communications through routers, including segmenting a computer software application into stages of a software pipeline, the software pipeline comprising one or more paths of execution, each stage comprising a flexibly configurable module of computer program instructions identified by a stage ID, each stage executing in a thread of execution on an IP block; allocating, by at least one of the stages, memory to be shared among at least two stages including creating a smart pointer, the smart pointer including data elements for determining when the shared memory can be deallocated; determining, by at least one stage in dependence upon the data elements for determining when the shared memory can be deallocated, that the shared memory can be deallocated; and deallocating the shared memory.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of exemplary embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts of exemplary embodiments of the invention.
Exemplary apparatus and methods for data processing with a NOC in accordance with the present invention are described with reference to the accompanying drawings, beginning with
Stored in RAM (168) is an application program (184), a module of user-level computer program instructions for carrying out particular data processing tasks such as, for example, word processing, spreadsheets, database operations, video gaming, stock market simulations, atomic quantum process simulations, or other user-level applications. Also stored in RAM (168) is an operating system (154). Operating systems useful data processing with a NOC according to embodiments of the present invention include UNIX™ Linux™ Microsoft XP™, AIX™ IBM's i5/OS™ and others as will occur to those of skill in the art. The operating system (154) and the application (184) in the example of
The example computer (152) includes two example NOCs according to embodiments of the present invention: a video adapter (209) and a coprocessor (157). The video adapter (209) is an example of an I/O adapter specially designed for graphic output to a display device (180) such as a display screen or computer monitor. Video adapter (209) is connected to processor (156) through a high speed video bus (164), bus adapter (158), and the front side bus (162), which is also a high speed bus.
The example NOC coprocessor (157) is connected to processor (156) through bus adapter (158), and front side buses (162 and 163), which is also a high speed bus. The NOC coprocessor of
The example NOC video adapter (209) and NOC coprocessor (157) of
The computer (152) of
The example computer (152) of
The exemplary computer (152) of
For further explanation,
In the NOC (102) of
One way to describe IP blocks by analogy is that IP blocks are for NOC design what a library is for computer programming or a discrete integrated circuit component is for printed circuit board design. In NOCs according to embodiments of the present invention, IP blocks may be implemented as generic gate netlists, as complete special purpose or general purpose microprocessors, or in other ways as may occur to those of skill in the art. A netlist is a Boolean-algebra representation (gates, standard cells) of an IP block's logical-function, analogous to an assembly-code listing for a high-level program application. NOCs also may be implemented, for example, in synthesizable form, described in a hardware description language such as Verilog or VHDL. In addition to netlist and synthesizable implementation, NOCs also may be delivered in lower-level, physical descriptions. Analog IP block elements such as SERDES, PLL, DAC, ADC, and so on, may be distributed in a transistor-layout format such as GDSII. Digital elements of IP blocks are sometimes offered in layout format as well.
Each IP block (104) in the example of
Each IP block (104) in the example of
Each IP block (104) in the example of
Each memory communications controller (106) in the example of
The example NOC includes two memory management units (‘MMUs’) (107, 109), illustrating two alternative memory architectures for NOCs according to embodiments of the present invention. MMU (107) is implemented with an IP block, allowing a processor within the IP block to operate in virtual memory while allowing the entire remaining architecture of the NOC to operate in a physical memory address space. The MMU (109) is implemented off-chip, connected to the NOC through a data communications port (116). The port (116) includes the pins and other interconnections required to conduct signals between the NOC and the MMU, as well as sufficient intelligence to convert message packets from the NOC packet format to the bus format required by the external MMU (109). The external location of the MMU means that all processors in all IP blocks of the NOC can operate in virtual memory address space, with all conversions to physical addresses of the off-chip memory handled by the off-chip MMU (109).
In addition to the two memory architectures illustrated by use of the MMUs (107, 109), data communications port (118) illustrates a third memory architecture useful in NOCs according to embodiments of the present invention. Port (118) provides a direct connection between an IP block (104) of the NOC (102) and off-chip memory (112). With no MMU in the processing path, this architecture provides utilization of a physical address space by all the IP blocks of the NOC. In sharing the address space bi-directionally, all the IP blocks of the NOC can access memory in the address space by memory-addressed messages, including loads and stores, directed through the IP block connected directly to the port (118). The port (118) includes the pins and other interconnections required to conduct signals between the NOC and the off-chip memory (112), as well as sufficient intelligence to convert message packets from the NOC packet format to the bus format required by the off-chip memory (112).
In the example of
For further explanation,
In the example of
In the NOC (102) of
Each memory communications execution engine (140) is enabled to execute a complete memory communications instruction separately and in parallel with other memory communications execution engines. The memory communications execution engines implement a scalable memory transaction processor optimized for concurrent throughput of memory communications instructions. The memory communications controller (106) supports multiple memory communications execution engines (140) all of which run concurrently for simultaneous execution of multiple memory communications instructions. A new memory communications instruction is allocated by the memory communications controller (106) to a memory communications engine (140) and the memory communications execution engines (140) can accept multiple response events simultaneously. In this example, all of the memory communications execution engines (140) are identical. Scaling the number of memory communications instructions that can be handled simultaneously by a memory communications controller (106), therefore, is implemented by scaling the number of memory communications execution engines (140).
In the NOC (102) of
In the NOC (102) of
Many memory-address-based communications are executed with message traffic, because any memory to be accessed may be located anywhere in the physical memory address space, on-chip or off-chip, directly attached to any memory communications controller in the NOC, or ultimately accessed through any IP block of the NOC—regardless of which IP block originated any particular memory-address-based communication. All memory-address-based communication that are executed with message traffic are passed from the memory communications controller to an associated network interface controller for conversion (136) from command format to packet format and transmission through the network in a message. In converting to packet format, the network interface controller also identifies a network address for the packet in dependence upon the memory address or addresses to be accessed by a memory-address-based communication. Memory address based messages are addressed with memory addresses. Each memory address is mapped by the network interface controllers to a network address, typically the network location of a memory communications controller responsible for some range of physical memory addresses. The network location of a memory communication controller (106) is naturally also the network location of that memory communication controller's associated router (110), network interface controller (108), and IP block (104). The instruction conversion logic (136) within each network interface controller is capable of converting memory addresses to network addresses for purposes of transmitting memory-address-based communications through routers of a NOC.
Upon receiving message traffic from routers (110) of the network, each network interface controller (108) inspects each packet for memory instructions. Each packet containing a memory instruction is handed to the memory communications controller (106) associated with the receiving network interface controller, which executes the memory instruction before sending the remaining payload of the packet to the IP block for further processing. In this way, memory contents are always prepared to support data processing by an IP block before the IP block begins execution of instructions from a message that depend upon particular memory content.
In the NOC (102) of
Each network interface controller (108) in the example of
Each router (110) in the example of
In describing memory-address-based communications above, each memory address was described as mapped by network interface controllers to a network address, a network location of a memory communications controller. The network location of a memory communication controller (106) is naturally also the network location of that memory communication controller's associated router (110), network interface controller (108), and IP block (104). In inter-IP block, or network-address-based communications, therefore, it is also typical for application-level data processing to view network addresses as location of IP block within the network formed by the routers, links, and bus wires of the NOC.
In the NOC (102) of
Each virtual channel buffer (134) has finite storage space. When many packets are received in a short period of time, a virtual channel buffer can fill up—so that no more packets can be put in the buffer. In other protocols, packets arriving on a virtual channel whose buffer is full would be dropped. Each virtual channel buffer (134) in this example, however, is enabled with control signals of the bus wires to advise surrounding routers through the virtual channel control logic to suspend transmission in a virtual channel, that is, suspend transmission of packets of a particular communications type. When one virtual channel is so suspended, all other virtual channels are unaffected—and can continue to operate at full capacity. The control signals are wired all the way back through each router to each router's associated network interface controller (108). Each network interface controller is configured to, upon receipt of such a signal, refuse to accept, from its associated memory communications controller (106) or from its associated IP block (104), communications instructions for the suspended virtual channel. In this way, suspension of a virtual channel affects all the hardware that implements the virtual channel, all the way back up to the originating IP blocks.
One effect of suspending packet transmissions in a virtual channel is that no packets are ever dropped in the architecture of
For further explanation,
The method of
The method of
The method of
On a NOC according to embodiments of the present invention, computer software applications may be implemented as software pipelines. For further explanation,
Because each stage (602, 604, 606) is implemented by computer program instructions executing on an IP block (104 on
The network-address based communications (622-632) in the example of
Each stage implements a producer/consumer relationship with a next stage. Stage 1 receives work instructions and work piece data (620) through a host interface processor (105) from an application (184) running on a host computer (152). Stage 1 carries out its designated data processing tasks on the work piece, produces output data, and sends the produced output data (622, 624, 626) to stage 2, which consumes the produced output data from stage 1 by carrying out its designated data processing tasks on the produced output data from stage 1, thereby producing output data from stage 2, and sends its produced output data (628, 630, 632) to stage 3, which in turn consumes the produced output data from stage 2 by carrying out its designated data processing tasks on the produced output data from stage 2, thereby producing output data from stage 3, which then stores its produced output data (634, 636) in an output data structure (638) for eventual return through the host interface processor (105) to the originating application program (184) on the host computer (152).
The return to the originating application program is said to be ‘eventual’ because quite a lot of return data may need to be calculated before the output data structure (638) is ready to return. The pipeline (600) in this example is represented with only six instances (622-632) in three stages (602-606). Many pipelines according to embodiments of the present invention, however, may includes many stages and many instances of stages. In an atomic process modeling application, for example, the output data structure (638) may represent the state at a particular nanosecond of an atomic process containing the exact quantum state of billions of sub-atomic particles, each of which requires thousands of calculations in various stages of a pipeline. Or in a video processing application, for a further example, the output data structure (638) may represent a video frame composed of the current display state of thousands of pixels, each of which requires many calculations in various stages of a pipeline.
Each instance (622-632) of each stage (602-606) of the pipeline (600) is implemented as an application-level module of computer program instructions executed on a separate IP block (104 on
In the example of
Configuring a stage with IDs for instances of a next stage as described here provides the stage with the information needed to carry out load balancing across stages. In the pipeline of
Instantiating a number of instances of each stage in dependence upon the performance of one or more of the stages can be carried out by instantiating, by a host interface processor (105), a new instance of a stage when monitored performance indicates a need for a new instance. As mentioned, instances (610, 612) in this example are both configured to send their resultant workloads (628, 630) to instance (616) of stage 3, whereas only one instance (614) of stage 2 sends work (632) to instance (618) of stage 3. If instance (616) becomes a bottleneck trying to do twice the workload of instance (618), an additional instance of stage 3 may be instantiated, even in real time at run time if needed.
The NOC of
The example NOC also includes a smart pointer (704), which in turn includes data elements (728, 730) for determining when the shared memory (702) can be deallocated. The smart pointer (704) is a ‘pointer’ in the sense that it is implemented as a structure that contains a pointer (722) to a segment of memory (702) that is shared among stages in a software pipeline. The memory pointer (722) may be implemented, for example, as an address of the beginning of the shared memory segment, the beginning address plus an extent or size of the shared memory segment, both a beginning address and an ending address, and so on, as will occur to those of skill in the art. The smart pointer (704) is ‘smart’ in that it is implemented as an instance of an object-oriented class that includes accessor functions (724, 726) for setting the values of the data elements (728, 730) for determining when the shared memory (702) can be deallocated. The accessor functions are named respectively SetInUse( ) (724) and SetNoLongerRequired( ) (726). Each accessor function takes a call parameter, “instanceID,” an identifier of an instance of a stage in a software pipeline. Each accessor function sets a value in a corresponding data element. SetInUse( ) (724) sets a value in an InUse (728) data element, and SetNoLongerRequired( ) (726) sets a value in a NoLongerRequired (730) data element. In many embodiments, more than one instance of a stage will have access to the same shared memory segment, so that a smart pointer will administer multiple sets of InUse and NoLongerRequired data elements for determining when the shared memory can be deallocated. Such embodiments can store multiple sets of InUse and NoLongerRequired data elements for determining when the shared memory can be deallocated in a table, for example. In such embodiments, the “instanceID” parameter may be used to specify which rows of the table contain InUse and NoLongerRequired data elements whose values are to be set by any particular call to an accessor function.
Just as a stage, or an instance of a stage, can allocate memory to be shared among stages, so also, in the example of
In the example NOC of
A software pipeline typically includes one or more paths of execution. In the example of
For ease of explanation, the example pipeline (600) here is represented with only three paths of execution among its stages. Readers will recognize, however, that many NOCs that share memory in a software pipeline according to embodiments of the present invention will implement many more stages, many instances of stages, and many paths of execution among the stages.
The data elements (728, 730) for determining when the shared memory can be deallocated can be implemented as a table that includes at least one row for each path of execution in the pipeline. Such a table can include, as data elements for determining when the shared memory can be deallocated, a column indicating that a segment of the shared memory is in use by a stage in a path of the pipeline and another column indicating that the segment of shared memory is no longer required for use by the stage in a path of execution in the pipeline. An example of such a table is set forth here as Table 1, and subsequent examples of the same table are set forth below as Tables 1a and 1b:
Table 1 includes three rows for each path of execution in the software pipeline of
In a NOC according to embodiments of the present invention, one of the stages of pipeline typically is designated as responsible for determining, in dependence upon data values in the columns of the table, that the memory can be deallocated. In the example NOC of
It would make no difference whether the data values are numerical or Boolean as long as the operations on each column are symmetric. The values being equal in each row will demonstrate that the shared memory can be deallocated. Consider for further explanation, an example in which the accessor functions use the numeric values 0 and 1 to indicate whether a stage or an instance of a stage is using or no longer requires use of a shared memory segment. In such an example, the In Use and the No Longer Required columns can be initialized entirely to 0 when a smart pointer for a particular segment of shared memory is first instantiated. Table 1 shows an example of an initial state of values in data elements (728, 730) of a smart pointer for the memory (702) shared among stages of the software pipeline in the example of
Instances of stages indicate their current use of the shared memory by calling SetInUse(instanceID), thereby setting the value 1 in a row of the table corresponding to the calling instance. Table 1a show the state of such a table after a number of calls to the SetInUse(instanceID) accessor function.
In Table 1a, the values of In Use (728) have been set to 1 for instances (608) and (614), indicating that the shared memory segment is in use by instances of stages 1 and 2 in the pipeline of
Instances of stages may indicate that use of a segment of shared memory is no long required by calling SetNoLongerRequired (instanceID), thereby setting the value 1 in a row of the table corresponding to the calling instance. Table 1b show the state of such a table after a number of calls to the SetNoLongerRequired (instanceID) accessor function.
In Table 1a, the values of No Longer Required (730) have been set to 1 for instances (608) and (614), indicating that the shared memory segment administered by use of data elements in Table 1b is no longer required by instances of stages 1 and 2 in the software pipeline of
For further explanation,
The method of
In the method of
In the method of
For further explanation,
The method of
The method of
The method of
In the method of
As described above with reference to Tables 1, 1a, and 1b, in an embodiment that uses the same initial data values and the same values to indicate ‘in use’ and ‘no longer required,’ the fact that each row contains the same value in both its ‘in use’ and ‘no longer required’ fields can be taken to mean that a shared memory segment is eligible for deallocation. The requirement in such an embodiment is that the corresponding values in each row are the same. In such an embodiment, however, there is no requirement that all values in all such fields across rows be the same. Table 1b illustrates this fact. Looking down the In Use (728) and the No Longer Required (730) columns, the values of the fields vary across rows. Both the In Use and the No Longer Required values within any single row, however, are all equal in Table 1b. All four sets of In Use and No Longer Required values for instances (608, 614) are set to 1. All remaining two-sets of In Use and No Longer Required are set to 0. Table 1b therefore depicts data elements for determining when shared memory can be deallocated indicating that the share memory controlled by these data elements is in a condition to be deallocated.
The method of
Exemplary embodiments of the present invention are described largely in the context of a fully functional computer system for software pipelining on a NOC. Readers of skill in the art will recognize, however, that the present invention also may be embodied in a computer program product disposed on computer readable media for use with any suitable data processing system. Such computer readable media may be transmission media or recordable media for machine-readable information, including magnetic media, optical media, or other suitable media. Examples of recordable media include magnetic disks in hard drives or diskettes, compact disks for optical drives, magnetic tape, and others as will occur to those of skill in the art. Examples of transmission media include telephone networks for voice communications and digital data communications networks such as, for example, Ethernets™ and networks that communicate with the Internet Protocol and the World Wide Web as well as wireless transmission media such as, for example, networks implemented according to the IEEE 802.11 family of specifications. Persons skilled in the art will immediately recognize that any computer system having suitable programming means will be capable of executing the steps of the method of the invention as embodied in a program product. Persons skilled in the art will recognize immediately that, although some of the exemplary embodiments described in this specification are oriented to software installed and executing on computer hardware, nevertheless, alternative embodiments implemented as firmware or as hardware are well within the scope of the present invention.
It will be understood from the foregoing description that modifications and changes may be made in various embodiments of the present invention without departing from its true spirit. The descriptions in this specification are for purposes of illustration only and are not to be construed in a limiting sense. The scope of the present invention is limited only by the language of the following claims.
This application is a continuation application of and claims priority from U.S. patent application Ser. No. 11/938,376, filed on Nov. 12, 2007.
Number | Name | Date | Kind |
---|---|---|---|
4813037 | Debuysscher et al. | Mar 1989 | A |
4951195 | Fogg et al. | Aug 1990 | A |
5167023 | De Nicolas et al. | Nov 1992 | A |
5301302 | Blackard et al. | Apr 1994 | A |
5442797 | Casavant et al. | Aug 1995 | A |
5590308 | Shih | Dec 1996 | A |
5761516 | Rostoker et al. | Jun 1998 | A |
5784706 | Oberlin et al. | Jul 1998 | A |
5802386 | Kahle et al. | Sep 1998 | A |
5870479 | Feiken et al. | Feb 1999 | A |
5872963 | Bitar et al. | Feb 1999 | A |
5884060 | Vegesna et al. | Mar 1999 | A |
5887166 | Mallick et al. | Mar 1999 | A |
5974487 | Hartmann | Oct 1999 | A |
6021470 | Frank et al. | Feb 2000 | A |
6044478 | Green | Mar 2000 | A |
6047122 | Spiller | Apr 2000 | A |
6049866 | Earl | Apr 2000 | A |
6085296 | Karkhanis et al. | Jul 2000 | A |
6085315 | Fleck et al. | Jul 2000 | A |
6092159 | Ekner et al. | Jul 2000 | A |
6101599 | Wright et al. | Aug 2000 | A |
6105119 | Kerr et al. | Aug 2000 | A |
6119215 | Key et al. | Sep 2000 | A |
6145072 | Shams et al. | Nov 2000 | A |
6151668 | Pechanek et al. | Nov 2000 | A |
6164841 | Mattson et al. | Dec 2000 | A |
6179489 | So et al. | Jan 2001 | B1 |
6272598 | Arlitt et al. | Aug 2001 | B1 |
6292888 | Nemirovksy et al. | Sep 2001 | B1 |
6298370 | Tang et al. | Oct 2001 | B1 |
6370622 | Chiou et al. | Apr 2002 | B1 |
6434669 | Arimilli et al. | Aug 2002 | B1 |
6446171 | Henriksen | Sep 2002 | B1 |
6493817 | Renstrom | Dec 2002 | B1 |
6519605 | Gilgen et al. | Feb 2003 | B1 |
6567084 | Mang et al. | May 2003 | B1 |
6567895 | Scales | May 2003 | B2 |
6591347 | Tischler et al. | Jul 2003 | B2 |
6625662 | Satoh et al. | Sep 2003 | B1 |
6668307 | Damron | Dec 2003 | B1 |
6668308 | Barroso et al. | Dec 2003 | B2 |
6675284 | Warren | Jan 2004 | B1 |
6697932 | Yoaz et al. | Feb 2004 | B1 |
6725317 | Bouchier et al. | Apr 2004 | B1 |
6823429 | Olnowich | Nov 2004 | B1 |
6832184 | Bleier et al. | Dec 2004 | B1 |
6877086 | Boggs et al. | Apr 2005 | B1 |
6891828 | Ngai | May 2005 | B2 |
6898791 | Chandy et al. | May 2005 | B1 |
6915402 | Wilson et al. | Jul 2005 | B2 |
6938253 | Kim | Aug 2005 | B2 |
6950438 | Owen et al. | Sep 2005 | B1 |
6961824 | Rowlands et al. | Nov 2005 | B2 |
6973032 | Casley et al. | Dec 2005 | B1 |
6988149 | Odenwald | Jan 2006 | B2 |
7010580 | Fu et al. | Mar 2006 | B1 |
7015909 | Morgan, III et al. | Mar 2006 | B1 |
7020751 | Kershaw | Mar 2006 | B2 |
7072996 | Adusumilli et al. | Jul 2006 | B2 |
7162560 | Taylor et al. | Jan 2007 | B2 |
7376789 | Halleck et al. | May 2008 | B2 |
7394288 | Agarwal | Jul 2008 | B1 |
7398374 | DeLano | Jul 2008 | B2 |
7464197 | Ganapathy et al. | Dec 2008 | B2 |
7478225 | Brooks et al. | Jan 2009 | B1 |
7493474 | Pechanek et al. | Feb 2009 | B1 |
7500060 | Anderson et al. | Mar 2009 | B1 |
7502378 | Lajolo et al. | Mar 2009 | B2 |
7521961 | Anderson et al. | Apr 2009 | B1 |
7533154 | Chen et al. | May 2009 | B1 |
7539124 | Rhim et al. | May 2009 | B2 |
7546444 | Wolrich et al. | Jun 2009 | B1 |
7568064 | Reblewski et al. | Jul 2009 | B2 |
7590774 | Johns et al. | Sep 2009 | B2 |
7613882 | Akkawi et al. | Nov 2009 | B1 |
7664108 | Bahattab | Feb 2010 | B2 |
7689738 | Williams et al. | Mar 2010 | B1 |
7701252 | Chow et al. | Apr 2010 | B1 |
7882307 | Wentslaff et al. | Feb 2011 | B1 |
7886084 | Chen et al. | Feb 2011 | B2 |
8214624 | Berglas et al. | Jul 2012 | B2 |
8429661 | Alfieri et al. | Apr 2013 | B1 |
20020099833 | Steely et al. | Jul 2002 | A1 |
20020178337 | Wilson et al. | Nov 2002 | A1 |
20030065890 | Lyon | Apr 2003 | A1 |
20040037313 | Gulati et al. | Feb 2004 | A1 |
20040078482 | Blumrich et al. | Apr 2004 | A1 |
20040083341 | Robinson et al. | Apr 2004 | A1 |
20040088487 | Barroso et al. | May 2004 | A1 |
20040111422 | Devarakonda et al. | Jun 2004 | A1 |
20040111594 | Feiste et al. | Jun 2004 | A1 |
20040151197 | Hui | Aug 2004 | A1 |
20040153579 | Shih et al. | Aug 2004 | A1 |
20040216105 | Burky et al. | Oct 2004 | A1 |
20040250046 | Gonzalez et al. | Dec 2004 | A1 |
20040260906 | Landin et al. | Dec 2004 | A1 |
20050044319 | Olukotun | Feb 2005 | A1 |
20050086435 | Todoroki | Apr 2005 | A1 |
20050097184 | Brown et al. | May 2005 | A1 |
20050149689 | Sodani et al. | Jul 2005 | A1 |
20050160209 | Van Doren et al. | Jul 2005 | A1 |
20050166205 | Oskin et al. | Jul 2005 | A1 |
20050198442 | Mandler | Sep 2005 | A1 |
20050203988 | Nollet et al. | Sep 2005 | A1 |
20050238035 | Riley | Oct 2005 | A1 |
20060095920 | Gossens | May 2006 | A1 |
20060101249 | Bacon et al. | May 2006 | A1 |
20060168430 | Walterscheidt et al. | Jul 2006 | A1 |
20060190707 | Mcilvaine et al. | Aug 2006 | A1 |
20060203825 | Beigne et al. | Sep 2006 | A1 |
20060209846 | Clermidy et al. | Sep 2006 | A1 |
20060242393 | Park et al. | Oct 2006 | A1 |
20070055826 | Morton et al. | Mar 2007 | A1 |
20070055961 | Callister et al. | Mar 2007 | A1 |
20070074192 | Geisinger | Mar 2007 | A1 |
20070076739 | Manjeshwar et al. | Apr 2007 | A1 |
20070180310 | Johnson et al. | Aug 2007 | A1 |
20070226407 | Radulescu et al. | Sep 2007 | A1 |
20070239888 | Croxford | Oct 2007 | A1 |
20070271557 | Geisinger | Nov 2007 | A1 |
20070283324 | Geisinger | Dec 2007 | A1 |
20080028401 | Geisinger | Jan 2008 | A1 |
20080074433 | Jiao et al. | Mar 2008 | A1 |
20080133885 | Glew | Jun 2008 | A1 |
20080134191 | Warrier et al. | Jun 2008 | A1 |
20080181115 | Soulie et al. | Jul 2008 | A1 |
20080186998 | Rijpkema | Aug 2008 | A1 |
20080198166 | Chung et al. | Aug 2008 | A1 |
20080205432 | Gangwal | Aug 2008 | A1 |
20080216073 | Yates et al. | Sep 2008 | A1 |
20080307422 | Kurland et al. | Dec 2008 | A1 |
20080320235 | Beckmann et al. | Dec 2008 | A1 |
20090019190 | Blocksome | Jan 2009 | A1 |
20090083263 | Felch et al. | Mar 2009 | A1 |
20090109996 | Hoover et al. | Apr 2009 | A1 |
20090122703 | Gangwal et al. | May 2009 | A1 |
20090125574 | Mejdrich et al. | May 2009 | A1 |
20090125703 | Mejdrich et al. | May 2009 | A1 |
20090125706 | Hoover et al. | May 2009 | A1 |
20090135739 | Hoover et al. | May 2009 | A1 |
20090138567 | Hoover et al. | May 2009 | A1 |
20090138670 | Mutlu et al. | May 2009 | A1 |
20090157976 | Comparan et al. | Jun 2009 | A1 |
20090182954 | Mejdrich et al. | Jul 2009 | A1 |
20090187716 | Comparan et al. | Jul 2009 | A1 |
20090201302 | Hoover et al. | Aug 2009 | A1 |
20090210592 | Hoover et al. | Aug 2009 | A1 |
20090210883 | Hoover et al. | Aug 2009 | A1 |
20090213863 | Denteneer et al. | Aug 2009 | A1 |
20090245257 | Comparan et al. | Oct 2009 | A1 |
20090260013 | Heil et al. | Oct 2009 | A1 |
20090271172 | Mejdrich et al. | Oct 2009 | A1 |
20090271597 | Kuesel et al. | Oct 2009 | A1 |
20090276572 | Heil et al. | Nov 2009 | A1 |
20090282139 | Mejdrich et al. | Nov 2009 | A1 |
20090282197 | Comparan et al. | Nov 2009 | A1 |
20090282211 | Hoover et al. | Nov 2009 | A1 |
20090282214 | Kuesel et al. | Nov 2009 | A1 |
20090282221 | Heil et al. | Nov 2009 | A1 |
20090282222 | Hoover et al. | Nov 2009 | A1 |
20090282226 | Hoover et al. | Nov 2009 | A1 |
20090282227 | Hoover et al. | Nov 2009 | A1 |
20090282419 | Mejdrich et al. | Nov 2009 | A1 |
20090285222 | Hoover et al. | Nov 2009 | A1 |
20090287885 | Kriegel et al. | Nov 2009 | A1 |
20090307714 | Hoover et al. | Dec 2009 | A1 |
20100070714 | Hoover et al. | Mar 2010 | A1 |
20120203971 | Hoover et al. | Aug 2012 | A1 |
20120209944 | Mejdrich et al. | Aug 2012 | A1 |
20120215988 | Kriegel et al. | Aug 2012 | A1 |
Number | Date | Country |
---|---|---|
1599471 | Mar 2005 | CN |
01283663 | Nov 1989 | JP |
05225153 | Sep 1993 | JP |
07311750 | Nov 1995 | JP |
018185380 | Jul 1996 | JP |
10232788 | Sep 1998 | JP |
10240707 | Sep 1998 | JP |
2005018620 | Jan 2005 | JP |
2005513610 | May 2005 | JP |
2005513611 | May 2005 | JP |
2005521124 | Jul 2005 | JP |
2006515690 | Jun 2006 | JP |
2009110512 | May 2009 | JP |
WO2007010461 | Jan 2007 | WO |
Entry |
---|
Hansson et al. “Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip”, Jan. 6-10, 2007, vol. 2007, 10 pages. |
Notice of Allowance, U.S. Appl. No. 11/972,753, Sep. 28, 2012. |
Office Action, U.S. Appl. No. 12/031,738, Aug. 20, 2012. |
Office Action, U.S. Appl. No. 12/118,059, Aug. 14, 2012. |
Notice of Allowance, U.S. Appl. No. 11/945,396, Oct. 23, 2012. |
Notice of Allowance, U.S. Appl. No. 12/118,017, Oct. 30, 2012. |
Notice of Allowance, U.S. Appl. No. 12/113,286, Dec. 12, 2012. |
Office Action Dated Jan. 29, 2010 in U.S. Appl. No. 11/945,396. |
Final Office Action Dated Jan. 15, 2010 in U.S. Appl. No. 12/031,733. |
Gupta et al., “Synthesis and Simulation of Digital Systems Containing Interacting Hardware and Software Componenets”, 29th ACM/IEEE Design Automatic Conference, 1992, pp. 225-230. |
Luca Benini et al., “Network on Chips: A New SoC Paradigm”, Computer IEEE, Jan. 2002, vol. 35, Issue 1, pp. 7-78. |
Yutaka Yamada et al., “Analysis about Topologies of Network on Chip”, IPSJ SIG Technical Report, Information Processing of Japan, vol. 2004, No. 123, pp. 35-40. |
Office Action, U.S. Appl. No. 11/936,873, Apr. 22, 2013. |
Office Action, U.S. Appl. No. 12/102,033, Jun. 6, 2013. |
Office Action, U.S. Appl. No. 13/440,589, May 23, 2013. |
Final Office Action, U.S. Appl. No. 13/461,913, Jun. 4, 2013. |
Office Action, U.S. Appl. No. 13/778,862, Jun. 14, 2013. |
U.S. Appl. No. 12/117,897, filed May 9, 2008, Hoover, et al. |
U.S. Appl. No. 12/031,733, filed Feb. 15, 2008, Hoover, et al. |
U.S. Appl. No. 12/108,846, filed Apr. 24, 2008, Kuesel, et al. |
U.S. Appl. No. 12/108,770, filed Apr. 24, 2008, Mejdrich, et al. |
U.S. Appl. No. 12/029,647, filed Feb. 12, 2008, Hoover, et al. |
U.S. Appl. No. 12/118,017, filed May 9, 2008, Comparan, et al. |
U.S. Appl. No. 12/118,059, filed May 9, 2008, Mejdrich, et al. |
U.S. Appl. No. 12/117,875, filed May 9, 2008, Hoover, et al. |
U.S. Appl. No. 12/121,222, filed May 15, 2008, Kriegel, et al. |
U.S. Appl. No. 11/936,873, filed Nov. 8, 2007, Hoover, et al. |
U.S. Appl. No. 12/135,364, filed Jun. 9, 2008, Hoover, et al. |
U.S. Appl. No. 11/937,579, filed Nov. 9, 2007, Mejdrich, et al. |
U.S. Appl. No. 12/102,033, filed Apr. 14, 2008, Heil, et al. |
U.S. Appl. No. 12/118,272, filed May 9, 2008, Kuesel, et al. |
U.S. Appl. No. 12/118,039, filed May 9, 2008, Hoover, et al. |
U.S. Appl. No. 11/945,396, filed Nov. 27, 2007, Hoover, et al. |
U.S. Appl. No. 12/015,975, filed Jan. 17, 2008, Comparan, et al. |
U.S. Appl. No. 12/117,906, filed May 9, 2008, Hoover, et al. |
U.S. Appl. No. 12/233,180, filed Sep. 18, 2008, Hoover, et al. |
U.S. Appl. No. 12/113,286, filed May 1, 2008, Heil, et al. |
U.S. Appl. No. 11/955,553, filed Dec. 13, 2007, Comparan, et al. |
U.S. Appl. No. 12/031,738, filed Feb. 15, 2008, Hoover, et al. |
U.S. Appl. No. 11/972,753, filed Jan. 11, 2008, Mejdrich, et al. |
U.S. Appl. No. 12/060,559, filed Apr. 1, 2008, Comparan, et al. |
U.S. Appl. No. 11/926,212, filed Oct. 29, 2007, Hoover, et al. |
U.S. Appl. No. 12/118,298, filed May 9, 2008, Heil, et al. |
U.S. Appl. No. 12/118,315, filed May 9, 2008, Mejdrich, et al. |
U.S. Appl. No. 11/938,376, filed Nov. 12, 2007, Mejdrich, et al. |
U.S. Appl. No. 12/121,168, filed May 15, 2008, Hoover, et al. |
Office Action Dated Jul. 20, 2009 in U.S. Appl. No. 12/031,733. |
Kuskin, et al.; The Stanford Flash Multiprocessor; Jun. 6, 1996; Stanford University. |
Kumar et al., “A Network on Chip Architecture and Design Methodology,” 2002, IEEE, 8 pages. |
Notice of Allowance, U.S. Appl. No. 12/031,738, Mar. 12, 2013. |
Notice of Allowance, U.S. Appl. No. 12/118,059, Mar. 21, 2013. |
Office Action, U.S. Appl. No. 13/445,005, Dec. 14, 2012. |
Office Action, U.S. Appl. No. 13/461,913, Jan. 24, 2013. |
U.S. Appl. No. 13/778,862, Feb. 27, 2013. |
Master Dissertation, University of Electronic Science and Technology of China, 2007, pp. 0-35 and pp. 36-81 (includes English abstract). |
Wikipedia, “Parallel Computing”, Wikipedia [online], URL: http://en.wikipedia.org/wiki/Parallel—computing, Jan. 19, 2007, pp. 1-6, USA. |
Pande et al., “Performance Evaluation and Design Trade-Offs for Network-on-Chip Interconnect Architectures”, IEEE Transactions on Computers, vol. 54, No. 8, Aug. 2005, pp. 1025-1040, IEEE Computer Society, USA. |
Samman et al., “Networks-On-Chip Based on Dynamic Wormhole Packet Identity Mapping Management”, VLSI Design, Aug. 7, 2008, 15 pp., vol. 2009, Article ID 941701, Hindawi Publishing Corporation, USA. |
Mereu, “Conception, Analysis, Design and Realization of a Multi-socket Network-on-Chip Architecture and of the Binary Translation support for VLIW core targeted to Systems-on-Chip”, Mar. 2007, 145 pages, accessible at http://www.diee.unica.it/driei/tesi/19—mereu.pdf. |
Radulescu et al., “An Efficient On-Chip Network Interface Offering Guaranteed Services, Shared-Memory Abstraction, and Flexible Network Configuration”, from Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (Date'04), held in Paris, France Feb. 2004, pp. 878-883, vol. 2, IEEE Computer Society, USA. |
Kavaldjiev, et al., “Providing QoS Guarantees in a NoC by Virtual Channel Reservation”, In Proc. of Int. Workshop on Applied and Reconfigurable Computing (ARC), Mar. 2006, pp. 1-12. |
Taylor et al., “System on Chip Packet Processor for an Experimental Network Service Platform”, Global Telecommunications Conference (Globecom'03), Dec. 2003, pp. 3933-3937, vol. 7, IEEE Xplore Digital Library (online), DOI: 10.1109/GLOCOM.2003.1258967. |
Intel, “Intel® E8870 System Chipset: The Cost-Effective Solution for Scalable Servers”, Jun. 2002, pp. 1-10, Intel, USA. |
Bolotin et al., “The Power of Priority: NoC based Distributed Cache Coherency”, 1st International Symposium on Networks-on-Chip (NOCS'07), May 21, 2007, pp. 117-126, IEEE Xplore Digital Library (online), DOI: 10.1109/NOCS.2007.42. |
Virtanen et al., “NoC Interface for a Protocol Processor”, IEEE Norchip Nov. 2003, pp. 1-104, University of Turku, Finland. |
Walter et al., “BENoC: A Bus-Enhanced Network on-Chip”, Center for Communication and Information Technologies (CCIT) Report, Dec. 2007, pp. 1-109, Technion, Israel Institute of Technology, Haifa, Israel. |
Furber et al., “Future Trends in SOC Interconnect”, Proceedings of the International Symposium on System-On-Chip (SoC), IEEE Computer Society, Aug. 2000, USA. |
Huneycutt, et al., “Software Caching using Dynamic Binary Rewriting for Embedded Devices”, Sep. 2001, Proceedings of the International Conference on Parallel Processing, 10 pages. |
Cifuentes, et al., “Walkabout—A Retargetable Dynamic Binary Translation Framework”, Sun Microsystems Laboratories, Jan. 2002, 13 pages. |
Issenin et al.; Data Reuse Driven Memory and Network-on-Chip Co-Synthesis. In Proceedings of International Embedded Systems Symposium ( IESS), May 30-Jun. 1, 2007. |
Monchiero, et al, “Exploration of Distributed Shared Memory Architectures for NoC-based Microprocessors”, Journal of Systems Architecture, vol. 53, Issue 10, Oct. 2007, pp. 1-8. |
Al-Hashimi; “System-on-Chip—Next Generation Electronics”, May 2006, Chapter 18 (“AsynchronoUS-on-chip networks”), pp. 1-32, The Institution of Electrical Engineers (IEE Press). |
Nollet et al., “Centralized Run-Time Resource Management in a Network-on-Chip Containing Reconfigurable Hardware Tiles” [online]. [retrieved Jul. 15, 2011], 6 pages, retrieved from Internet: http://portal.acm.org/ft—gateway.cfm?id=1049106&type=pdf&CFID=32720390&CFTOKEN=986277114. |
Kavaldjiev, “A Run-Time Reconfigurable Network-on-Chip for Streaming DSP Applications”, University of Twente [online], Jan. 2007 [retrieved Feb. 6, 2014], Retrieved from Internet: <URL: http://eprints.eemcs.utwente.nl/9192/01/thesis—print.pdf>, whole document. |
Office Action, U.S. Appl. No. 11/936,873, Feb. 12, 2014. |
Office Action, U.S. Appl. No. 12/102,033, Sep. 25, 2013. |
Number | Date | Country | |
---|---|---|---|
20120209944 A1 | Aug 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11938376 | Nov 2007 | US |
Child | 13453380 | US |