UT1553B BCRT True Dual-port Memory Interface

Similar documents
UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS

McAfee Network Security Platform

Fig.25: the Role of LEX

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

10.5 Graphing Quadratic Functions

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

COMP 423 lecture 11 Jan. 28, 2008

Address/Data Control. Port latch. Multiplexer

Engineer-to-Engineer Note

Concepts Introduced. A 1-Bit Logical Unit. 1-Bit Half Adder (cont.) 1-Bit Half Adder

MIPS I/O and Interrupt

Agilent Mass Hunter Software

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

Voltage Monitoring Products

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Distributed Systems Principles and Paradigms

Engineer To Engineer Note

Presentation Martin Randers

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

Enginner To Engineer Note

LCI/USB LonWorks Commissioning Interface

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

McAfee Network Security Platform

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables

Engineer To Engineer Note

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.

pdfapilot Server 2 Manual

EasyMP Multi PC Projection Operation Guide

Error Numbers of the Standard Function Block

From Dependencies to Evaluation Strategies

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA:

Zenoss Service Impact Installation and Upgrade Guide for Resource Manager 5.x and 6.x

Example: 2:1 Multiplexer

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

2 Computing all Intersections of a Set of Segments Line Segment Intersection

Discussion 1 Recap. COP4600 Discussion 2 OS concepts, System call, and Assignment 1. Questions. Questions. Outline. Outline 10/24/2010

Epson iprojection Operation Guide (Windows/Mac)

McAfee Network Security Platform

Reducing a DFA to a Minimal DFA

McAfee Network Security Platform

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

Registering as an HPE Reseller

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

EasyMP Network Projection Operation Guide

Tilt-Sensing with Kionix MEMS Accelerometers

Basics of Logic Design Arithmetic Logic Unit (ALU)

McAfee Network Security Platform

How to Design REST API? Written Date : March 23, 2015

OPERATION MANUAL. DIGIFORCE 9307 PROFINET Integration into TIA Portal

Simrad ES80. Software Release Note Introduction

PARALLEL AND DISTRIBUTED COMPUTING

Guide for sending an Electronic Dental referral

Small Business Networking

SoC Architecture Design Approaches

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia

McAfee Network Security Platform

Small Business Networking

McAfee Network Security Platform

Welch Allyn CardioPerfect Workstation Installation Guide

Monitoring and Alerting. 19 SEP 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1

Dr. D.M. Akbar Hussain

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Small Business Networking

Engineer-to-Engineer Note

Monitoring and Alerting. 27 MAR 2018 VMware Validated Design 4.2 VMware Validated Design for Software-Defined Data Center 4.2

TO REGULAR EXPRESSIONS

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

12-B FRACTIONS AND DECIMALS

Lists in Lisp and Scheme

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

Engineer-to-Engineer Note

Polycom RealPresence Media Editor Quick Start

Agenda & Reading. Class Exercise. COMPSCI 105 SS 2012 Principles of Computer Science. Arrays

EasyMP Network Projection Operation Guide

Computer Arithmetic Logical, Integer Addition & Subtraction Chapter

EasyMP Multi PC Projection Operation Guide

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

vcloud Director Tenant Portal Guide vcloud Director 9.0

Small Business Networking

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

Tixeo compared to other videoconferencing solutions

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

Algorithm Design (5) Text Search

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

Midterm 2 Sample solution

QEL 33A/35A, 98/99 Series

vrealize Suite 7.0 Backup and Restore by Using EMC Avamar vrealize Suite 7.0

CS 241 Week 4 Tutorial Solutions

CS201 Discussion 10 DRAWTREE + TRIES

- 2 U NIX FILES 1. Explin different file types vilble in UNIX or P OSIX s ystem. ( 08 mrks) ( My-08/Dec-08/My-10/My- 12) 2. Wht is n API? How is it di

Questions About Numbers. Number Systems and Arithmetic. Introduction to Binary Numbers. Negative Numbers?

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2014

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Transcription:

UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl functions. The BCRT design reduces the overhed plced on the host computer y utomticlly executing messge trnsfers, providing interrupts, nd generting sttus informtion. The BCRT off-lods the host processor with uilt-in memory mngement functions designed specificlly for MI-STD- 553B pplictions. This mens tht the host need only estlish the necessry dt nd/or control prmeters in memory so the BCRT cn ccess the informtion s required nd, therefore, provide the requisite MI-STD-553B us functions. UTMC vrints of the BCRT re the BCRTM, BCRT with monitor functions, nd the BCRTMP, BCRT which opertes in wide vriety of 553 protocols. This note will discuss true dul-port (TDP) interfce configurtion. The design uses 2K x 6 dul-port memory device ville from severl mnufcturers. If dditionl memory is needed, the designer cn incorporte more thn one memory chip. Some mnufcturers lso offer single pckge dul-port RAM ssemlies in configurtions up to 8K x 6. This interfce is pplicle to the BCRT, the BCRTM, nd the BCRTMP. TRUE DUA-PORT CONFIGURATION The TDP configurtion s min dvntge over oth the DMA (direct memory ccess) nd PDP (pseudo dul-port) configurtions is tht it genertes miniml impct on the host processor s opertions. In the DMA configurtion, the processor must e put on hold during ny BCRT memory ccess. Using the PDP method, the processor must wit for the BCRT whenever the BCRT is ccessing common memory. The only time the processor must wit in the TDP configurtion is when the processor tries to ccess the exct sme memory loction to which the BCRT lredy hs ccess, or when the host processor needs to ccess one of the BCRT s internl registers nd the BCRT is in memory cycle. The TDP configurtion s min disdvntge is cost. The price of dul-port devices is significntly higher thn tht of stndrd memory, nd the density of the memory devices is lower. Of course, in system where throughput is the driving issue, the TDP method is the most effective solution. CIRCUIT OPERATION - MEMORY ARBITRATION Figure shows the circuit s sic configurtion. Figure 2 detils opertion of the PD. The PD is designed s Mely mchine to improve response time nd simplify stte trnsitions. The dul-port RAM contins two signls: BUSY nd BUSYR. When oth the host nd BCRT ccess the sme memory loctions t the sme time, one of these signls will ssert. Generlly, the rules outlined in tle re followed. Tle. Simultneous Memory Aritrtion CONDITION WINNING SIDE NOTES left ns efore right left right ns efore left right left/right within ns of ech other ritrtion, 2 Notes:. = detection limit, this vlue is etween 2 nd ns depending upon the device used. 2. Aritrtion lgorithm depends on device. Exmples: lwys give to left, give to side which didn t hve it lst, rndom, etc. The TDP configurtion outlined in this note uses BUSY, BUSYR,, DMAG, MEMCSI, BCRTCS, nd to properly ritrte RAM use. When the BCRT needs to red or write to dul-port memory, it sserts. If (or when) the host ccess to memory is inctive (i.e., MEMCSI is desserted), DMAG will e sserted nd the BCRT will egin its memory cycle. Note tht in this cse, the memory loction eing ccessed does not ffect the ritrtion decision. This would seem to defet the purpose of the dul-port. owever, the BCRT- side ritrtion must work this wy for the following comintion of resons:. In order to determine usy condition in the dul-port RAM, ll ddresses must e known. 2. Once the BCRT receives DMAG, there is no wy to dely completion of its memory cycle.

Thus, if we try to give the BCRT grnt nd use BUSYR for collision, there is no wy to use BUSYR to dely the BCRT when n ddress mtch occurs. This is relly not prolem; since the BCRT s throughput is not very high, it cn fford to wit for host memory cycle to complete. Figure 3 shows BCRT-memory ccess timing. Note: Most host ccess times re smll (/) compred to the BCRT request-to-grnt requirement of.9µs t 2Mz. owever, when designing system, this requirement should not e overlooked. When the host ccesses memory, it is only delyed if collision occurs, thus relizing the dvntge of the dulport RAM. If nd only if n ddress mtch occurs, BUSY will ssert nd the host will hve to wit for the BCRT to complete its cycle. If the host ccesses memory loction other thn the one the BCRT is using, oth the BCRT nd host will complete their memory cycles normlly. Figure 5 shows the timing digrms for host-memory ccesses oth with nd without ritrtion. A specil ritrtion cse my lso occur in this design. After the BCRT receives DMAG, the host my ccess memory. The BCRT my tke up to four MCK periods efore it ctully egins the memory ccess, thus it is possile the host my egin cycle fter DMAG hs sserted ut efore MEMCSO on the BCRT sserts. Since the BCRT hs lredy strted cycle, it is too lte to stop this ccess. If the host nd BCRT ddress the sme memory loction in this sitution, BUSYR will ssert. As ws lredy stted, there is no wy to stop the BCRT in this sitution. To correct this prolem, the host will e delyed if BUSYR sserts. The signl will dessert nd the chip select to the host side of memory will e locked. This clers the BUSYR condition. The BCRT will complete its cycle. After completion, the host chip select will e resserted nd the host cycle will complete. The PD device controls ll of the ritrtion. It consists of stte mchine to control ccess to the BCRT us nd some rndom logic to generte the signl. Specil Cutions Since this document is written for generic processor, some cutions re necessry for direct use of this design:. To prevent multiple BCRT red/write opertions, the BCSI (BCRT chip select in) signl must e sserted low for no more thn one cycle fter the flling edge of. 2. The signl stys in n sserted stte to fcilitte fster memory ccess times. Thus during host-to-bcrt cycle, the signl must dessert high first. This dessertion my tke s long s two clock cycles. 3. During host-to-bcrt register red, the dt from the BCRT is only vlid for one clock cycle fter the signl is sserted low. 4. During host-to-memory cycle, the signl is synchronous; it my chnge to desserted stte t ny time during the cycle. As long s the host cycle does not complete while is desserted, no prolems will occur. REGISTER ARBITRATION The sme Address/Dt us is used for oth BCRT register ccess y the host nd memory ccess y the BCRT. Thus, when the host ccesses BCRT internl register, it must wit for the BCRT to complete current memory cycle. This is ccomplished using the host s signl nd the BCRT s DMACK signl. When the BCRT is given grnt, DMACK is sserted until the BCRT is finished. The ssertion of DMACK will prevent the ddress/dt uffers nd the line from eing enled. When the BCRT completes, the uffers re enled. One clock cycle lter, the signl will ssert. Figure 4 shows the timing digrms for host-bcrt ccesses with nd without ritrtion. FURTER ASSISTANCE Due to the vriety of processors to which the BCRT cn e connected, this document cnnot ddress ll the possiilities. Contct UTMC pplictions support for dditionl ssistnce. 2

BCRTCS MEMCSI + + BCSI PD + + MCSI BUSY BUSY BUSY BUSY BMCSO + DUA-PORT RAM BCSO ABUFEN CS DMAG CS MEMCSO RD R RRD R R G 245 O/I G 244 O 3

BCSO DMACK I ABUFEN BUSY + D R MCSO BUSYR MCSI To void confusion, the PD design is implemented in positive (ctive high) logic. It will e necessry to dd inverters to the design where - + - DMAG BCSO DMAG I** BCSI BCSO + MCSI BCSO c - * low if is not sserted ** low if BCSI is sserted BCSO* Figure 2. PD Description 4

5 PD stte mchine equtions: BCSO : = - BCSI - S - S + S - SI - DMAG : = MCSI - - S - S : = S - + S I : = S - + - MCSI S - - BCSI + S - S NS : = @ S @ S S + @ @ S S NS : = @ S @ BCSI x = don t cre = outputs which will proly need inversion MCSI BCSI DMACK BCSO DMAG I S NS c INPUT VARIABES NET OUTPUT VARIABES c c

no ritrtion (MCSI never sserted) CK MACINE DMAG DMACK ritrtion with host to memory ccess CK MACINE MCSI DMAG DMACK ritrtion with host to BCRT ccess - worst cse CK MACINE BCSI c DMAG DMACK Figure 3. BCRT-Memory Access (Single Word) 6

no ritrtion red CK MACINE c BCSI BCSO RD no ritrtion write CK MACINE c BCSI BCSO Figure 4. ost-bcrt Access 7

MCSI red write ritrtion MCSI red write RD 8