CA2103895C - Method and apparatus for controlling data communication operations within stations of a local area network - Google Patents

Method and apparatus for controlling data communication operations within stations of a local area network Download PDF

Info

Publication number
CA2103895C
CA2103895C CA002103895A CA2103895A CA2103895C CA 2103895 C CA2103895 C CA 2103895C CA 002103895 A CA002103895 A CA 002103895A CA 2103895 A CA2103895 A CA 2103895A CA 2103895 C CA2103895 C CA 2103895C
Authority
CA
Canada
Prior art keywords
command
transmit
receive
status
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002103895A
Other languages
French (fr)
Other versions
CA2103895A1 (en
Inventor
Ariel Hendel
John D. Virzi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Standard Microsystems LLC
Original Assignee
Standard Microsystems LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Standard Microsystems LLC filed Critical Standard Microsystems LLC
Publication of CA2103895A1 publication Critical patent/CA2103895A1/en
Application granted granted Critical
Publication of CA2103895C publication Critical patent/CA2103895C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

Method and apparatus are provided for data communication control within the communication controllers (7) of stations within a local area network. The method and apparatus involves maintaining within the command and status control interface unit of the commu-nication controller, receive and transmit command queues as well as receive and transmit status queues. Pluralities of receive and transmit data packet storage locations are provided for storing data packets to be received as well as transmitted. Each receive command is uniquely associated with a data packet storage location. Receive and transmit commands are buffered in a pipeline manner in the receive and transmit command queues, respectively, whereas receive and trans-mit status bits are buffered in a pipeline manner in the receive and transmit status queues, respectively. The processor interfacing with the communication controller buffers transmit and receive com-mands in their respective queues and allocates corresponding data packet storage locations for these commands. The media access con-trol unit (17) of the communication controller executes each com-mand when it is ready according to network protocol, and generates status bits which are buffered in respective status bit queues.

Description

2 PGT/US92/00414 .
~:~~38J~
~ i t i METHOD AND APPARATUS FOR CONTROLLING ;
DATA COMMUNICATION OPERATIONS WITHIN
STATIONS OF A LOCAL-AREA NETWORK
i BACKGROUND OF THE INVENTION ' Field of Invention The present invention generally concerns a method and apparatus for controlling data communication operations l0 within stations of a local-area network (LAN), and more particularly to such a method and apparatus which enables the communication controller of each station to transfer data over the network communication medium, in a manner less sensitive to the interrupt latency of the processors of such stations.
Brief Descrit~tion of the Prior Art Local-area networks are communication systems for enabling data-processing devices, such as computer workstations, to communicate with each other through a communication (e. g. transmission) media. Data-processing devices in such networks are typically referred to as nodes or stations, and many such stations are likely to be relatively autonomous, requiring communication with other stations only occasionally. Other stations may require more frequent communication, and the amount of communication required by a particular station can vary fro~i time to time.
In many local area networks, stations can be easily added to, removed from, and moved from place to place within the network. While there are numerous local area networks presently known, they can be classified into two general types. The first type of network is referred to as a f ~~.~,i .vi\
f ~1U389~
' t "centralized network" which is characterized by the requirement of a centralized network controller which implements the network protocol. The second type of local ' area network is referred to as a "distributed network"
which does not require a centralized network controller, and instead provides each station within the network with a communication controller having a medium access control (MAC) unit that locally implements the network protocol within each communication controller.
In a distributed local area network, packet switching is a technique commonly employed to dynamically allocate the communication resources of the network among multiple communicating stations. According to this technique, messages to be communicated between stations are partitioned (by the transmitting station's processor) into packets, having a fixed maximum size. The packets are then ascriued a station (i.e. source) identifier. The packets are then placed on the communication medium by the station's communication controller. Such packets are then sensed and selectively processed by the communication controller of the destination station in the network.
Any packet from one station to another station contains various fields of information specified in accordance with a predetermined network protocol. The information typically includes the identity of the source station, the identity of the destination station, and various other information concerning the characteristics of the packet.
In some network protocols, a number of different types of packets may appear on the communication medium in accordance with the network protocol. Typically, these packets relate to either communication control or data-transfer functions.
To more fully appreciate the problems associated with conventional communication controllers used in the WO 92/15162 ~ ~ ~ ~ ~ ~ ~ PCT/US92/00414 ~:':'=i stations of distributed local-area-networks, reference is made to Figs. 1 through 4.
In Fig. 1, a distributed local area-network 1 is shown, comprising a plurality of stations (i.e. nodes 2A through 2M) which are operably associated to a communication medium 3, such as a cable. In Fig. 2, each station is shown to generally comprise a processor (e.g., CPU) 4, a program memory 5, a system memory 6, a communication controller 7, a system bus 8, and a communication medium interface unit 9. Processor 4, program memory 5 and system memory 6 are each associated with a system bus 8, and the system bus, in turn, is interfaced with communication controller 7, as shown. Communication controller 7 is interfaced with the communication medium by way of communication medium interface unit 9.
Typically, communication medium interface unit 9 is suitably adapted for the particular characteristics of the communication medium being employed in the network.
In Fig. 3, the subcomponents of a conventional communication controller 7 are shown to generally comprise a system bus interface unit 10, a command and status interface unit 11, a medium access contral unit 12, and a data packet memory buffer 13. The system bus interface unit 10 interfaces system bus 8 with the command and status interface unit 11 and data packet memory buffer 13 of the communication controller. Command and status interface unit 11 interfaces system bus interface unit 10 with medium access control unit 12, as shotgun. Medium access control unit 12 interfaces the data packet memory buffer 13 with communication medium interface unit 9, and thus the communication medium 3, as shown.
Medium access control unit Z2 comprises a microsequencer running a microprogram (i.e., an algorithm) which effectuates the network protocol and ultimately, the communication controller's access to the communication WO 92/15162 1'C.°f/US92/00414 . . f~~' ~1U389~ ~~ ~~ ' 4 medium. To successfully carry out the network protocol, each medium access control unit in each station communication controller must perform the same algorithm.
To effectuate data transmission and data reception through the network, the network operating program of each station.
is operably associated with a software based low-level driver which maintains data transmit and data receive queues within the station's system memory. Processor "interrupts" provided by the communication controller are the basic scheduling events upon which the low-level driver manages the transmit and receive queues to and from the communication controller.
An important requirement of the low-level driver of each station's network operating program is that it is matched to the command and status interface unit and the memory structure of the data packet buffer. To effect data communication between two stations in the network, several critical operations must occur between the processor (CPU) arid the communication controller of the transmitting station prior to putting a data packet onto the communication medium. In particular, during the transmit mode, the low-level driver must issue a transmit command to the command and status interface unit after a data packet is being transferred from system memory to an assigned location in the data packet memory buffer. Also, during the receive mode, the low-level driver must issue a receive command to the command and status interface unit before a data packet is being transferred from the data packet memory buffer to an assigned location in the system memory. The nature of prior art communication controllers, is such, however, that it can only work on one command of each type (i.e. transmit vs. receive) at any given time.
Communication of data packets between two stations in such distributed networks is governed by the microprogram 21~38~5 '' running each station's communication controller and the network protocol. In the case of a token-passing network using, for example, the Arcnet~ local area network protocol, each station is periodically given an t 5 opportunity to transmit data packets to a desired t destination station within the network. Whether transmitting or receiving data packets, each communication ;
controller will indicate to its processor the completion of each command by issuing an "interrupt" to its central ' processors, which are acted upon by the low-level driver of the processor's network operating system.
Prior art data communication control employed in such distributed networks has not been without serious shortcomings and drawbacks, however.
In particular, the main limitation of such communication control schemes has been that there is a dead time from when the communication controller completes a command, until the station processor services the corresponding interrupt generated by the communication controller. For example, if the communication controller has just completed reception of a data packet, the communication controller cannot receive another data packet until the processor services the corresponding interrupt generated by the communication controller. Also, if the communication controller has just completed transmission of a data packet, then, even though the communication controller has received an invitation to transmit from a receiving station, the communication controller is not capable of commencing a subsequent transmissicn until its station's processor services the corresponding interrupt generated by the communication controller. During such dead time, illustrated in Fig. 4 as Td, the communication controller cannot utilize the network for the same type of operation as the one just completed. This limitation of prior art data WO 92!15162 FCT/US92/00414 . ,r, . 6385 communication control results in a reduction in network throughput. In some scenarios, this limitation can translate into potentially undelivered data packets.
Thus, there is a great need in the art to provide a data communication control technique which can improve node and network data throughput, and make each communication controller less sensitive to processor interrupt response time, while avoiding the shortcomings and drawbacks of prior art data communication control techniques for distributed local area networks.
Accordingly, it is a primary object of the present invention to provide a method and apparatus for data communication control which allows consecutive transmissions and receptions of data packets to occur 1~ without host processor intervention.
It is another object of the present invention to provide such a method and apparatus for managing a page-oriented communication controller, so as to eliminate the minimum back-to-back separation between two communication events of the same type.
It is a further object of the present invention to provide such a method and apparatus in which transmit and receive commands and transmit and receive status interrupt bits are pipelined within a queue of selected depth.
A further object of the present invention is to provide such apparatus in the form of a communication controller for a local area network, in which four outstanding commands (two transmit and two receive commands) as well as their respective status interrupt bits can be buffered, and whenever the communication controller completes execution of one particular command, the communication controller immediately accesses the next command without the occurrence of a dead time between these events.
An even further object of the present invention is to provide such a communication controller allowing a simple WO 92/15162 PG'f/US92100414 _ ~l~~s~~
double-buffering memory structure for data packets, while requiring minimal changes to existing low-level software drivers.
These and other objects will become apparent hereinafter and in the claims.
Summary of Invention According to one of the broader aspects of the present invention, a command and status interface circuit is provided for use with a communication controller.
As envisioned in one embodiment, the communication controller comprises a bus interface unit, a data~packet buffering means and a medium access control unit. The bus interface unit interfaces with the command and status interface circuit and with a system bus over which data packets and transmit and receive commands can be transmitted through the bus interface unit, and to the data packet buffering means and the command and status interface unit, respectively. The data packet buffering means has a plurality of data packet storage locations, each of Which can be used for storing a data packet to be transmitted over or received from a communication medium.
The medium access control unit is capak.e of performing transmit and receive commands, and interfaces with the command and status interface circuit and with the communication medium.
In general, the command and status interface circuit of the present invention comprises a command k~~iffering means and a status buffering means which are each operatively associatable with the processor and the medium access control unit so as to allow consecutive transmission and reception of data packets in a manner which is independent of the operation of the processor. In a preferred embodiment, the command buffering means includes a first storage unit and a second storage unit. The first storage ., .. . ..
~1~3~J~
unit has a plurality of receive command storage locations, into each of which a receive command uniquely associated with a data storage location can be written in by the processor, and selectively read out therefrom by the medium access control unit. Similarly, the second storage.
unit has a plurality of transmit command storage locations, into each of which a transmit command uniquely associated with a data packet storage location can be written by the processor, and selectively read out therefrom by the medium access control unit. The status buffering means includes a third storage unit and a fourth storage unit. The third.storage unit has a plurality of receive status storage locations, into each of which a set of receive status bits can be written by the medium access control unit, and selectively read out therefrom by the processor. The fourth storage unit has a plurality of i:ransmit status storage locations, into each of which a set of transmit status bits can be written by the medium access control unit and selectively read out therefrom by the processor.
In a preferred embodiment, each storage unit is First-In-First-Out (FIFO) storage unit which is provided with a particular set of information storage and accessing capacities, described below as follows. First FIFO
storage unit permits the processor to write a receive command from the processor into the first FIFO storage unit upon the occurrence of a first prespecified processor event, and also permits the medium access control unit to read one receive command out of the first FIFO storage unit and into the medium access control unit upon the occurrence of a first prespecified event within the medium access control unit. The second FIFO storage unit permits the processor to write one transmit command from the processor into the second FIFO storage unit upon the occurrence of a second prespecified processor event, and ,;,<;, ~1;3".
9 ..
further permits the medium access control unit to read one transmit command from said second FIFO storage unit into the medium access storage unit upon the occurrence of a second prespecified event within the medium access control unit. The third FIFO storage unit permits the medium access control. unit to write one set of receive status bits from the medium access control unit into the third FIFO storage unit, and further permits the processor to read out one set of receive status bits from the third FIFO storage unit and transfer the set of receive status bits to the system bus interface unit. In turn, these receive status bits are selectively processed in order to generate interrupts to the processor. The fourth FIFO
storage unit permits the medium access control unit to write one set of transmit status bits from the medium access control unit into the fourth FIFO storage unit, and further permits the processor to read out one set of transmit status bits from the fourth FIFO storage unit and transfer the set of transmit status bits to the system bus interface unit. The system bus interface unit selectively processes these transmit status bits in order to generate interrupts to the processor.
In a preferred embodiment, the command and status interface unit further comprises command routing means for selectively routing the receive commands to the first FIFO
storage unit, the transmit commands to the second FIFO
storage unit, miscellaneous commands to the medium access control unit, and clearing commands to the third and fourth FIFO storage units.
According to another aspect of the present invention, a communication controller for a local area network is provided. The communication controller includes the status and control interface circuit of the present invention, in addition to various supporting components discussed above.

WO 92/15162 PCTJUS92/00414 _ .; .;
:~ U 3'~ ~ .~~~~ ~ ~ ~ ~ ~~
According to yet another aspect of the present invention, a method is provided for buffering receive and transmit commands and status bits within a command and status interface unit of the communication controller.
5 In general, the method involves maintaining in the command arid status interface unit, a receive command queue having a plurality of receive command storage locations.
These receive command storage locations includes a first insert storage location at which each receive command can 10 be inserted into the receive command queue, and a first removal storage location from which each receive command can be removed from the receive command queue. In the command and status interface unit, a transmit command 'queue is maintained having a second plurality of transmit command storage locations. These transmit command storage locations includes a second insert storage location at which each~transmit command can be inserted in the transmit command queue, and a second removal storage location from which each transmit command can be removed from the transmit command queue. Each transmit command storage lacau on is capable of storing a transmit command.
A first plurality of receive data packet storage locations is provided for storing a plurality of data packets to be received. Each receive data packet storage location is uniquely assignable to one receive command being stored in the receive command queue. A second plurality of transmit data packet storage locations is also provided for storing a plurality of data packets to be transmitted. Each transmit data packet storage location is uniquely assignable to one transmit command being stored in the transmit command queue.
In the command and status interface unit, the method further involves maintaining a receive status queue having a plurality of receive status bit storage locations.
These receive status bit storage locations include a third WO 92/15162 Pt~°I°/11S92/00414 y:~t~~ ~ 1 U ~ g 5 . ...
insert storage location at which each set of receive status bits can be inserted into the receive status queue, and a third removal storage location from which each set of receive status bits can be removed from the receive status queue. Each receive status bit storage location is uniquely associated with one receive command. In the command and status interface unit, a transmit status queue is provided having a plurality of transmit status bit storage locations. These transmit status bit storage locations include a fourth insert storage location at which each set of transmit status bits can be inserted into the transmit status queue, and a fourth removal storage location at which each set of transmit status bits can be removed from the transmit status queue. Each transmit status bit is uniquely associated with one transmit command.
According to the method of the present invention, receive and transmit commands are buffered in a pipeline manner in the receive and transm~.t command queues, respectively, whereas receive and transmit status bits are buffered in a pipeline manner in the receive and transmit status queues, respectively. The processor interfacing with the communication controller stores transmit and receive commands in their respective queues and allocates corresponding data packet storage locations for these commands within the communication contrpller. The media access control unit of the communication controller executes each command when it is ready according to network protocol, and generates corresponding status bits which are subsequently buffered in respective status bit queues. These status bits are then selectively processed to generate interrupts to the host processor. These interrupts can be serviced by the processor's low-level driver in due course without effecting or otherwise ., delaying consecutive data communication control operations executed by the media access control unit.
As a result of the present invention, it is now possible to consecutively transmit and receive virtually any number of data packets without the necessity of waiting for the host processor to service interrupts provided thereto during data communication operations by the communication controller.
The invention may be summarized according to a first aspect as a command and status interface unit for use in a communication controller operably associated with data packet buffer memory having a plurality of data packet storage locations, said command and status interface unit comprising: command buffering means having a plurality of receive command storage locations, into which one or more receive commands can be written by a processor and selectively read out therefrom by a medium access control unit, each said receive command being uniquely associated with one said data packet storage location, and a plurality of transmit command storage locations, into which one or more transmit commands can be written in by said processor and selectively read out therefrom by said medium access control unit, each said transmit command being uniquely associated with one said data packet storage location; and status buffering means having a plurality of receive status storage locations, into which a set of receive status bits can be written by said medium access control unit and selectively read out therefrom by said processor, and a plurality of transmit status storage locations, into which a set of transmit status bits can be written in by said medium access control unit and selectively read out therefrom by 12a said processor, said command buffering means and said status buffering means each being operably associatable with said processor and said medium access control unit so as to allow consecutive transmission and reception of said data packets in a manner independent of the operation of said processor.
According to a second aspect the invention provides a method of buffering receive and transmit commands and status bits within a command and status interface unit of a communication controller having a medium access control unit and being in operable association with a processor, said method comprising the steps of: (a) maintaining in said command and status interface unit, a receive command queue having a plurality of receive command storage locations, said receive command queue having a first insert storage location at which each receive command can be inserted into said receive command queue, and a first removal storage location from which each receive command can be removed from said receive command queue, each said receive command storage location being capable of storing one said receive command; (b) maintaining in said command and status interface unit, a transmit command queue having a second plurality of transmit command storage locations, said transmit command queue having a second insert storage location at which each transmit command can be inserted in said transmit command queue, and a second removal storage location from which each transmit command can be removed from said transmit command queue, each said transmit command storage location being capable of storing one said transmit command; (c) providing a first plurality of receive data packet storage locations for storing at least a first plurality of data packets to be received, each said receive data packet storage location being uniquely associated with one said receive command being stored in said receive 12b command queue; (d) providing a second plurality of transmit data packet storage locations for storing a second plurality of data packets to be transmitted, each said transmit data packet storage location being uniquely associated with one said transmit command being stored in said transmit command queue; (e) maintaining in said command and status interface unit, a receive status queue having a plurality of receive status bit storage locations, said receive status queue having a third insert storage location at which each set of receive status bits can be inserted into said receive status queue, and a third removal storage location from which each said set of receive status bits can be removed from said receive status queue, wherein each said receive status bit storage location is uniquely associated with one said receive command; and (f) maintaining in said command and status interface unit, a transmit status queue having a plurality of transmit status bit storage locations, said transmit status queue having a fourth insert storage location at which each set of transmit status bits can be inserted into said transmit status queue, and a fourth removal storage location at which each said set of transmit status bits can be removed from said transmit status queue, wherein each said transmit status bit is uniquely associated with one said transmit command.
According to a third aspect the invention provides a data communication controller operably associated with a data packet buffer means having a plurality of data packet storage locations, and a processor having a system bus and desiring access to a communication medium within a local area network, said data communication controller comprising:
a medium access control unit for controlling the access of said data communication controller to said communication medium; a command and status interface unit including 12c command buffering means and status buffering means, said command buffering means having a plurality of receive command storage locations, into which one or more receive commands can be written by a processor and selectively read out therefrom by a medium access control unit, each said receive command being uniquely associated with one said data storage packet location, and a plurality of transmit command storage locations, into which one or more transmit commands can be written in by said processor and selectively read out therefrom by said medium access control unit, each said transmit command being uniquely associated with one said data packet storage location, and said status buffering means having a plurality of receive status storage locations, into which a set of receive status bits can be written by said medium access control unit and selectively read out therefrom by said processor, and a plurality of transmit status storage locations, into which a set of transmit status bits can be written in by said medium access control unit and selectively read out therefrom by said processor, said command buffering means and said status buffering means each being operably associatable with said processor and said medium access control unit so as to allow consecutive transmission and reception of said data packets in a manner independent of the operation of said processor;
and a system bus interface unit for interfacing said command and status interface unit with the system bus of said processor.
Brief Description of the Drawings For a more complete understanding of the objects of the present invention, the detailed description of the illustrated embodiments is to be taken in connection with the following drawings, in which:

12d Fig. 1 is a schematic representation of a local area network system permitting a plurality of stations to access to a shared communication medium allocated in accordance with a network protocol;
Fig. 2 is a block functional diagram of a prior art station within the local area network of Fig. 1, showing the major components of the station;
Fig. 3 is a block functional diagram of the prior art station illustrated in Fig. 2, showing functional subunits of each major component of the station;
Fig. 4 is a schematic representation of data packet throughput over a network employing prior art data communication control techniques;
Fig. 5 is a block functional diagram of one embodiment of a communication controller constructed in accordance with the principles of the present invention;
Fig. 6 is a schematic representation of the data packet format for each data packet buffered in an assigned page of memory within the data packet memory of the communication controller of the illustrated embodiment;

~1:, .4 :;
.
Fig. 7 is a schematic representation of a data packet assembled in accordance with the field format of the illustrated embodiment;
Fig. 8 is a schematic representation of the status bits provided by the command and status interface unit of the illustrated embodiment to the bus interface unit, for selected reading by the station processor; and Fig. 9 is a flow control diagram illustrating the sequence of events occurring within the medium access control unit of the communication controller of the illustrated embodiment, during data packet transmission and reception operations.
Detailed Description of the Illustrated Embodiment Referring to Fig. 5, an illustrated embodiment of the communication controller of the~present invention is shown. In general, a communication controller 7~
comprises a bus interface unit 15, a command and status interface unit 16, a medium access control unit 17, and a data packet memory buffer 18. Preferably, all of these components would be imp'.~emented as digital circuits integrated on a single chip using known IC manufacturing techniques.
As hereinbefore described, bus interface unit 15, data packet memory buffer 18, and medium access control unit 17 are conventional and well known in the art. In the illustrated embodiment, Arcnet~ network protocol has been selected for medium access control unit 17, and a page-oriented memory organization for data packet memory buffer 18. Bus interface unit 15 can be adapted .'or interfacing with an IBM~ PC AT, bus 8, or any other su_table system bus known in the art.
System bus interface unit 15 typically includes logical circuitry for interfacing the address, data and command lines of system bus 8 with command and status interface 21G38~~ '' unit 16 and memory buffer 18. System bus interface unit 15 also includes a conventional interrupt generating means 19, which in the illustrated embodiment, receives a set of j receive and transmit status bits from command and status interface unit 16. Interrupt generating means 19 selectively processes such status bits and generates an ~ ' interrupt signal to the processor when certain status bits become true (i.e. attain conventional logic "1" level).
Such a functional subunit can be realized by an interrupt i mask register well known in the art. As shown in Fig. 5, interrupt signals are provided to the station (i.e. host) processor 4 by way of a designated interrupt line 20.
When the low-level driver executed by the host processor receives the interrupt, it will instruct the processor to read out the status bits from the command and status interface unit, in a manner which will be described in greater detail hereinafter.
Preferably, data packet memory buffer 18 comprises a dual-port, randomly-accessible memory (RAM) storage device which has a plurality of data storage locations. Memory buffer 18 is organized such that each addressable storage location (i.e. page) has a storage capacity sufficient for storing a data packet either transmitted from the station's system memory 6 by the processor, or received from a transmitting station by the medium access control unit. Preferably, at least four pages of memory storage are provided for by the data packet memory buffer, so that, at times, at least two pages of memory can be assigned to data packets to be'received, and at least two pages of memory assigned to data packets to be transmitted. In this way, a data packet receiving queue and a data packet transmitting queue can be simultaneously managed within data packet memory buffer 18.
In Fig. 6, a preferred format is shown for each page storage location in data packet memory buffer 18. Address ~ugSTITdJTE SHEET

WO 92/15162 1'CT/US92/00414 location O of each memory page contains the source identifier (SID) bits which identify the source of each data packet. As illustrated, address location 1 contains the destination identifier (DID) bits which identify the , 5 destination of each data packet. Address location 2 ' contains the count bits, which for short packets, for example, would have the value 256-N, where N represents the message length of each data packet.
Referring again to Fig. 5, medium access control unit 17 ' a 10 reads transmit, receive and other miscellaneous commands from command and status interface unit 16 of the present invention. As in prior art applications, medium access control unit 17 reads either a transmit or receive command from command and status interface unit 16, and then either 15 reads out from or writes into memory buffer 18, a data packet uniquely assigned to the acquired command. After execution of the data commun°ication operation, medium access control unit 17 writes various status bits into the command and status interface 16 to reflect completion of the operation. In turn, these transmit and/or receive status bits are provided to system bus interface unit 15, in which the status bits are continually presented to the processor, and are selectively processed by interrupt generating subunit 18 to produce an interrupt to the station's processor. Based on the interrupts to the processor, the interrupt driven low-level driver controls the processor to read the status bits from the system bus interface unit 8. The read status bits are then used by the low-level driver to orchestrate events at higher levels of the network operating system.
As hereinbefore described, medium access control unit 17 includes an internal microsequencer running a microprogram which performs all of the control operations necessary to carry out the Arcnet~ protocol. The microsequencer in general comprises a read-only memory for storing the t t t f . ' . ~ ., y( _;i;,.'~7 f 210~~~5 mlcroprogram, a program counter, two instruction registers, an instruction decoder, a no-op generator, and jump logic and network reconfiguration logic, which are configured together in a manner well known in the art.
To fully appreciate the control operations of medium access control unit 17 and, more particularly when it reads commands from and writes status bits into the command and status interface unit 16, an understanding of the Arcnet~ protocol is in order. In the Arcnet~
protocol, five types of "packets" may be placed on or otherwise transmitted over the network communication cable 3. The format of these packets is briefly described below.
The first type of packet is the Invitation to Transmit (ITT) packet which is used to pass the "token" from one station to another station according to a network configuration order determined during a network configuration operation well known in the art. In the Arcnet~ protocol, the ITT packet is sent by transmitting, in sequence, an Alert Burst consisting of 6 unit intervals of logic "1"'s, End of Transmission (EOT) bits consisting of ASCII Code 04 HEX, followed by two repeated Destination Identification (DID) characters.
The second type of packet is the Free Buffer Enduiry (FBE) packet which is used to ask another station in the network if it is ready to accept a packet of data. The FBE packet is sent by transmitting, in sequence, an Alert Burst, Enquiry (ENQ) bits consisting of an ASCII Code 85 HEX, followed by two repeated DID characters.
The third type of packet is the data packet which consists of the actual data being transmitted from one station to another. As illustrated in Fig. 7, a data packet is sent by transmitting, in sequence, an Alert Burst, Start of Header (SOH) bits consisting of ASCII code O1 HEX, two repeated DID characters, a Count field (i.e.

WO 92/15162 PCT/US92/00414 .
, 21~38~5 17 i j count = 256-N for short packets), a variable length data field, followed by two cyclical redundancy check (CRC) characters.
The fourth type of packet is the Acknowledgment (ACK) .
which is used to acknowledge reception of a packet, or as an affirmative response to Free Buffer Enquiries. The ACK
packet is sent by transmitting in sequence, an Alert Burst followed by an Acknowledgment (ACK) character consisting of ASCII Code 86 HEX.
The fifth type of packet is the Negative Acknowledgment (NAK) packet which is used as a negative response to FBE
packets. The NAK packet is sent by transmitting,.in sequence, an Alert Burst, followed by a Negative Acknowledgement (NAK) character consisting of ASCII Code 15 HEX.
Referring now to Fig. 5, the command and status interface unit 16 in accordance with the present invention.;
generally comprises a command buffering unit 21, a status buffering means 22, a command routing unit 23, and a status bit combining unit 24. In the preferred embodiment, command buffering unit 21 is realized by first and second first-in-first-out (FIFO) storage units 25 and 26, for temporary storage of receive and transmit commands, respectively. Each FIFO storage unit 25 and 26 has a plurality of command storage location, which in the illustrated embodiment, is of depth 2. Notably, however, in other embodiments the depth of these units can be greater than two. In one illustrated embodiment, the length of each storage location is of bit length seven.
As shown in Fig. 5, data lines from system bus 8 extend through bus interface unit 15, and connect to the data input of FIFO storage units 25 and 26. Also, address and control lines from the system bus extend through bus interface unit 15, into command routing unit 23, and connect to the write inputs of FIFO storage units 25 and WO 92/15162 1'CIYLJS92/00414 26. As seen by the processor, the storage locations in each FIFO storage unit 25 and 26 reside logically at the same address in the command buffering unit 21.
In general, the plurality of receive storage command locations of FIFO storage unit 25 includes a first insert _ i storage location into which each receive command can be written, and a first removal storage location from which each receive command can be read out. In practice, the insert and removal locations are indicated by the pointers of the addressing system used in implementing FIFO storage device 25. The first insert storage location is advanced by the processor writing a receive command into FIFO
storage unit 25. On the other hand, the first removal storage location is advanced by the medium access control unit reading a receive command from FIFO storage.unit 25.
Constructed as such, a receive command uniquely associated with a data packet in a specific storage location (i.e.
page) of memory buffer 18, can be written into the insert storage location of FIFO storage unit 25 by the processor.
Also the receive command stored in the removal storage location can be selectively read out therefrom by medium access control unit 17.
Similarly, the plurality of receive storage locations of FIFO storage unit 26 includes a second insert storage location, into which each transmit command can be written, and a second removal storage location from which each transmit command can be read out. Insert and removal locations of FIFO storage unit 26 would also be indicated by the pointers of the addressing system, as discussed above. The second insert storage location is advanced by the processor writing a transmit command into FIFO storage unit 26. The second removal storage location is advanced by the medium access control unit reading a transmit command from FIFO storage unit 26. Constructed as such, a transmit command uniquely associated with a data packet in WO 92/15162 PGT/US92/00414 .
a ~.~ ~?3~~5 a specific page location of memory buffer 18, can be written into the insert storage location of FIFO storage unit 26 by the processor. Also transmit command stored in the removal storage location can be selectively read out therefrom by medium access control unit 17.
With the command buffering means organized as described above, FIFO storage unit 25 is capable of queuing (i.e.
sequentially chaining together) receive commands and thus functions as a receive command queue, whereas FIFO storage unit 26 is capable of queuing transmit commands and thus functions as a transmit command queue. Also, since data packet memory buffer 18 is readily structurable into receive and transmit data packet queues, it is possible 'for medium access control unit 17 to consecutively execute transmit and receive commands (once loaded into FIFO
storage units 25 and 26, respectively) in a manner completely independent of the host processor.
As illustrated in Fig. 5, status buffering unit 22 is realized by third and fourth FIFO storage units 27 and 28, for temporary storage of receive and transmit status bits, respectively. As will be described in greater detail hereinafter, third and fourth FIFO storage units function as receive and transmit status bit queues, respectively.
Each FIFO storage unit 27 and 28 has a plurality of status bit storage locations which, in the illustrated embodiment, is of depth 2. As in the case of the command buffer unit, the depth of FIFO storage units 27 and 28 can also be expanded to a depth greater than two; however, what is minimally required for the successful practice of the invention is that the depth of the receive command and receive status FIFO storage units be equal, as should be the depth of the transmit command and transmit status FIFO
storage units. In the illustrated embodiments, the length of each status bit storage location in FIFO storage unit 27 is of bit length 1, whereas the length of FIFO storage WO 92/15162 PGT/US9210041~ .
_ i unit 28 is of bit length 2. Again, in other embodiments, the length of these storage locations may change.
As shown, command bit lines 30 and 31 extend from the output of command format conversion units 32 and 33, 5 respectively, and lead into medium access control unit 17.
The outputs of FIFO storage units 25 and 26 are connected to the inputs of format conversion units 32 and 33, respectively. The function of these units is to convert receive and transmit commands into receive and transmit 10 command bits. These format conversion units can be realized by using decoder technology known in the art.
Line 34 from medium access unit 17 provides status bit RI
to the read input of FIFO storage unit 25, and status bit TRI to the data input of FIFO storage unit 27. Also, line 15 35 from medium access control unit 17 provides status bit TA to the read input of second FIFO storage unit 26, and status bit TTA to the first data input of fourth FIFO
storage unit 28. On the other hand, line 36 from unit 17 provides status bit TMA to the second input of FIFO
20 storage unit 28.
Write .signals are provided to FIFO storage units 27 and 28 over write lines 37 and 38 emanating from the medium access control unit. Line 39 extends from command routing unit 23 to each read/clear input of FIFO storage units 27 and 28 so that clear receive (status) and clear transmit (status) commands can be provided from the processor to these FIFO storage units so as to advance respective removal storage locations therewithin. A line 40 is also provided between medium access control unit 17 and status bit combining unit 24 for providing the status bit combining unit with miscellaneous status bits, well known in the art.
The status bits read out of FIFO storage units 27 and 28 are sent over lines 41 and 42 to status bit combining unit 24, within which receive and transmit status bits from WO 92/15162 PC'T/US92/00414 .
hl 21 .
FIFO storage units 27 and 28 and miscellaneous status bits from medium access control unit 17, are combined. The sequence of combined status bits are, in turn, provided to bus interface unit 15 over line 43, as shown. The format of the sequence of combined status bits is illustrated in .
Fig. 8.
The plurality of receive status bit storage locations of third FIFO storage unit 27 include a third insert storage location into which each set of receive status bits can be written, and also, a third removal storage location from which each set of receive status bits can be read out. In general, the set of receive status bits can contain one or more elements, and in certain events, even the null element. Also, in practice, the insert and removal locations would be indicated by the pointers of the addressing system used in implementing FIFO storage device The third insert storage location is advanced by the medium access control unit writing a set of receive status bits into third FIFO storage unit 27. On the other hand, the third removal storage location is advanced by the processor issuing a clear receive command to third FIFO
storage unit 27. Constructed as such, a set of receive status bits uniquely associated with a received data packet in a specific page of memory buffer 18 can be written into the insert storage location of third FIFO
storage unit 27 by the medium access control unit. Also, the set of receive status bits in the third removal storage location can be selectively read out therefrom and combined with the other status bits in combiner unit,24, thereby updating the status bit sequence provided to the processor when it is so solicited. Also, whenever a clear receive command is issued to third FIFO storage unit 27, the current status bits) in the removal storage location are cleared, and the next set of receive status bits from the medium access control unit 17 can be read into the third insert storage location.
Similarly, the plurality of transmit status bits storage locations of fourth FIFO storage unit 28 include a fourth insert storage location into which each set of transmit status bits can be written, and a fourth removal storage location from which each set of transmit status bits can be read out. In general, the set of transmit status bits can contain one or more elements, and in certain events, even the null element. Also, as with the other FIFO
storage units, the insert and removal locations would also be indicated by the pointers of the addressing system used in implementing FIFO storage device 28. The fourth insert storage location is advanced by the medium access control unit writing a set of transmit status bits into fourth FIFO storage unit 28. On the other hand, the fourth removal storage location is advanced by the processor issuing a clear transmit command to fourth FIFO storage unit 28. Constructed as such, a set of transmit status bits uniquely associated with a to-be-transmitted data packet in a specific page of memory buffer 18 can be written into the insert storage location of fourth FIFO
storage unit by the medium access control unit 17. Also, the set of transmit status bits in the fourth removal storage location can be selectively read out therefrom and combined with the other status bits in combiner unit 24, thereby updating the status bit sequence provided to the processor when so solicited. Also, whenever a clear transmit command is issued to fourth FIFO storage unit 28, the current status bits) in the removal storage location are cleared, and the next set of transmit status bits from the medium access control unit 17 can be read into the fourth insert location.
With the above-described command and status interface unit, the sequence of combined status bits can be read by WO 92/15162 PG'flUS92/00414 _ , the processor when required, without necessarily clearing certain receive and/or transmit status bits through a designated status bit clearing operation, until desired by the processor.
Having described the structure and function of the command and status interface unit 16 of the present invention and its cooperation with the other functional units of communication controller 7', attention is now given to the events which trigger a number of significant operations within the command and status interface unit.
During the course of a station's operation within the local area network, a number of events can occur at the host processor, as well as Within the medium access control unit. Of the possible events which can occur at the processor, there are four, in particular, which have been selected to trigger four particular operations within the command and status interface unit. These four processor events shall be designated by events Ep~, EPZ, EP3, arid EP4. Similarly, of the possible events which can occur Within the medium access control unit during network protocol, there are four, in particular, which also have been selected to trigger an additional four operations within the command and status interface unit. These four events which occur within the medium access control unit shall be designated by events EH~, E"Z, EH3 and Eh4. The above-identified events are now described below.
In the illustrated embodiment, first FIFO storage unit 25 permits the processor to write a receive command into the first FIFO storage unit whenever event EPA occurs. This event occurs whenever the processor places a receive command on the system bus. Prior to event EPA, however, the processor must first select a page location in memory buffer 18 for the data packet to be received, and this page location must be uniquely assigned to (or associated ~z~o~s~~ _ . .

with) a particular receive command containing the received page location. Thus, after a page of memory has been selected in memory buffer 18 and a received command has been formulated, the processor is free to write the receive command into the first FIFO storage unit as and i when it pleases.
The medium access control unit is permitted to read a received command out of the first FIFO storage unit and into unit 17 itself, whenever event Eh~ occurs. This event occurs whenever the medium access control unit is ready, in the time sense, to accept a receive command for execution.
Similarly, second FIFO storage unit permits the processor to write a transmit command into second FIFO storage unit whenever event EPZ occurs. This event occurs whenever the processor places a transmit command on the system bus.
However, as is the case of data reception, the processor must select a page location in memory buffer 18, into which the data packet to be transmitted must be stored, and this memory location must be uniquely assigned to (or associated with) a particular transmit command. Thus, after a data packet has been stored in a page location of buffer memory 18 which is uniquely assigned to a formulated transmit command, the processor is free to write the transmit command into the second storage unit as and when it pleases.
The medium access control unit is permitted to read a transmit command out of second FIFO storage unit and into unit 17 itself, whenever event EHZ occurs. This event occurs whenever the medium access control unit is ready, in the time sense, to accept a transmit command for execution.
The medium access control unit can write a set of receive status bits into the third insert storage location of third FIFO storage unit 27. The third insert storage WO 92/15162 PCT/US92I00414 .
Ev =~~<~
location of third FIFO storage unit 27 is advanced whenever event EH3 occurs. This event occurs each time the medium access control unit writes receive status bits into the third FIFO storage unit. As the communication 5 controller 7' is configured in the illustrated embodiment, receive status bits in the third removal storage location are always being combined in status bit combining unit 24 and being presented to the system bus interface unit for inspection at any time by the processor. The receive 10 status bits in the third removal storage location are advanced each time event EP3 occurs at the processor. This event is when the processor issues a clear receive command to the command and status interface unit. When this occurs, the receive status bits in the third removal Z5 storage location are cleared (i.e. irretrievably erased), and the next receive status bits) in the chain of receive status bits are advanced to the current removal storage location in third FIFO storage unit 27.
Similarly, the medium access control unit can write a set 20 of transmit status bits into the fourth insert storage location of fourth FIFO storage unit 28. The fourth insert storage location of fourth FIFO storage unit 28 will be advanced whenever event E"4 occurs. This event occurs each time the medium access control unit writes 25 transmit status bits into the fourth FIFO storage unit.
As the communication controller 7' is configured in the illustrated embodiment, transmit status bits in the fourth removal storage location of FIFO storage unit 28 are always being combined in bit combiner unit 24 and being presented to the system bus interface unit for inspection at any time by the processor. The transmit status bits in the fourth removal storage register of FIFO storage unit are advanced each time event EP4 occurs at the processor.
This event occurs when the processor issues a clear transmit command to the command and status interface unit.

WO 92/15162 PCT/US92/00414 _ j ~ I
~.lfl~~~5 ~

When this occurs, the transmit status bits in the fourth removal storage location is cleared or irretrievably erased, and the next transmit status bits) in the chain ' ' ~
of transmit status bits is to the current removal storage ' register in fourth FIFO storage unit 28.
Having described the communication controller of the present invention and its various capabilities, a brief description of its operation in accordance with Arcnet~
network protocol is in order.
Communication on the network is based on a token passing protocol. Establishment of the network configuration and management of the network protocol are handled entirely by the medium access control unit in a manner well-known in the art. In general, the host processor (or other intelligent peripheral) 4 transmits data by simply loading a data packet and its destination ID into memory buffer 18, and issuing a transmit command to command and status and control unit 16, to enable the medium access control unit. If the receiving station responds by transmitting an ACK packet, then the data packet is transmitted followed by 16 bits of CRC code. If the receiving station cannot accept the data packet (e. g. because its receiver is inhibited), then it transmits a NAK packet and the transmitting station then passes the token. Once it has been established that the receiving station can accept the packet and transmission is complete, the receiving station will verify the packet. If the packet is received successfully, the receiving station transmits an ACK
packet allowing the transmitting station to set the appropriate status bits to indicate successful or unsuccessful delivery of the packet. The sequence of status bits provided to interrupt generating subunit 18 is then used to generate an interrupt to the processor when selected status bits become true.

WO 92/15162 PGT/US92/00414 .
21~3~~

Turning now to the flow chart of Fig. 9, the internal operations of communication controller 7' are described during both transmission and reception modes of operation.
As illustrated in Fig. 9, the various checks or E
conditions to be verified by the medium access control unit are expressed from a particular station's frame of reference. Thus, starting at block 50 the medium access control unit determines whether it holds the "token" by determining whether it has received an ITT packet. If the medium access control unit has received an ITT packet, then it enters the Transmit Data Packet Routine, as shown.
If the medium access control unit has not received an ITT
packet, then it enters the Receive Data Packet Routine.
The Transmit Data Packet Routine will be described first.
Upon receiving an ITT packet, the medium access control unit determines if status bit TA is a no value (i.e. logic "0"), indicative of the fact that the medium access control unit is available to transmit a data packet. If status bit TA is a no value, then medium access control unit transmits a FBE packet to the intended receiving station. If no input activity is detected from the receiving station within a predetermined time period (e. g.
74.7 microseconds) then the medium access control unit determines whether an ACK packet has been received. If it has, then the transmitting station sends the data packet.
On the other hand, if the transmitting station receives an ACK packet, then status bits TMA and TA are both set to logic "1". Thereafter, an ITT packet witr the next station ID code is transmitted to pass the token. If no input activity is detected within a predetermined period (e. g. 74.7 microseconds), then the medium access control unit will return to start, at which block 50 is entered.
If no input activity is detected from the station to whom the token was sent, then the station will increment the ID
code of the ITT packet and then send the token to the next 4 1.
21~38~5 .
28 '~~p station within the network configuration. As illustrated in Fig. 9, the transmitting station continues to send out the token until a station acts upon it. Most significantly, owing to the fact of command and status queueing, there is no need for the host processor to intervene during subsequent data transmission routines.
In the event that the medium access control unit was not available to transmit a data packet, as evidenced by the TA status bit having a "yes" value (i.e. logic "1"), the token passing loop is entered in order to enable the next eligible station in the network to transmit a data packet.
In the event that the reference station does not~possess the token, then the medium access control unit enters the Receive Data Packet Routine, as shown at block 50 in Fig.
9. According to this routine, the medium access control unit continually senses the communication medium until it detects a data packet by the presence of SOH bits. If SOH
bits are detected and if status bit RI has a "no" value indicative that the reference receiving station is not inhibited to receive a data packet, then the SID bits of the data packet are written into a reserved page within buffer memory 18, as specified in the current receive command.
Since the data packet can be intended solely for the reference receiving station, or for all stations in the network as during a "broadcast", the destination address of the data packet is checked against the receiving address. If the data packet to be received is intended either for all stations or the receiving station, then the medium access control unit writes the received data packet into the reserved page of buffer memory 18, and thereafter checks the integrity of the reception through an error detection technique. Then, the destination address of the data packet is checked against the address of the receiving station.

2~.~3~~~

If the received data packet was intended for only a single receiving station, then the ACK packet is sent by the receiving station to the transmitting station to acknowledge safe arrival of the data packet. Thereafter, the RI status bit is set to the "yes" value (i.e. logic "1") and then the medium access control unit returns to the start state, as shown. If, on the other hand, the data packet was broadcasted to all stations, then the medium access control unit does not send an ACK packet to the transmitting station, and simply sets status bit RI
a::.~ returns to the start state of operation. If the same transmitting station desires to consecutively receive a number of data packets, the communication controller of 'the receiving station need simply execute the Receive Data Packet Routine in a repeated manner when permitted by the network protocol. In such a case, host processor intervention is not immediately required.
In the illustrated embodiment of the present invention, the storage units of the command and status buffering means were realized using FIFO storage units. Notably, however, other types of storage devices, such as for example, Last-In-Last-Out (LILO) storage devices, can be used with expectedly good results with suitable modifications.
While the particular embodiments shown and described above have proven to be useful in many applications in the data communication art, further modifications of the present invention herein disclosed will occur to persons skilled in the art to which the present invention pertains, and all such modifications are deemed to be within the scope and spirit of the present invention defined by the appended claims.

Claims (47)

CLAIMS:
1. A command and status interface unit for use in a communication controller operably associated with data packet buffer memory having a plurality of data packet storage locations for storing data packets, said command and status interface unit comprising:
command buffering means having a plurality of receive command storage locations, into which one or more receive commands can be written by a processor and selectively read out therefrom by a medium access control unit, each said receive command being uniquely associated with one said data packet storage location, and a plurality of transmit command storage locations, into which one or more transmit commands can be written in by said processor and selectively read out therefrom by said medium access control unit, each said transmit command being uniquely associated with one said data packet storage location; and status buffering means having a plurality of receive status storage locations, into which a set of receive status bits can be written by said medium access control unit and selectively read out therefrom by said processor, and a plurality of transmit status storage locations, into which a set of transmit status bits can be written in by said medium access control unit and selectively read out therefrom by said processor, said command buffering means and said status buffering means each being operably associatable with said processor and said medium access control unit so as to allow consecutive transmission and reception of said data packets in a manner independent of the operation of said processor.
2. The command and status interface unit of claim 1, wherein said command buffering means comprises a first storage unit and a second storage unit, wherein said first storage unit contains said plurality of receive command storage locations, and said second storage unit contains said plurality of transmit command storage locations, and wherein said status buffering means comprises a third storage unit and a fourth storage unit, wherein said third storage unit contains said plurality of receive status storage locations, and said fourth storage unit contains said plurality of transmit status storage locations.
3. The command and status interface unit of claim 2, wherein said first storage unit permits said processor to write one said receive command from said processor into said first storage unit upon the occurrence of a first prespecified processor event, and further permitting said medium access control unit to read one said receive command out of said first storage unit and into said medium access control unit upon the occurrence of a first prespecified event within said medium access control unit, and wherein said second storage unit permits said processor to write one said transmit command from said processor into said second storage unit upon the occurrence of a second prespecified processor event, and further permitting said medium access control unit to read one said transmit command from said second storage unit into said medium access storage unit upon the occurrence of a second prespecified event within said medium access control unit.
4. The command and status interface unit of claim 3, wherein said third storage unit permits said medium access control unit to write one said set of receive status bits from said medium access control unit into said third storage unit, and further permitting said processor to read out one said set of receive status bits from said third storage unit and transfer said set of receive status bits to a system bus interface unit, for transfer to said system bus and for selected processing to generate interrupts to said processor, and wherein said fourth storage unit permits said medium access control unit to write one said set of transmit status bits from said medium access control unit into said fourth storage unit, and further permitting said processor to read out one said set of transmit status bits from said fourth storage unit and transfer said set of transmit status bits to said system bus interface unit, for transfer to a system bus and for selected processing to generate interrupts to said processor.
5. The command and status interface unit of claim 4, wherein said first storage unit comprises a first FIFO
storage unit, said second storage unit comprises a second FIFO storage unit, said third storage unit comprises a third FIFO storage unit, said fourth storage unit comprises a fourth FIFO storage unit.
6. The command and status interface unit of claim 5, which further comprises command routing means for selectively routing said receive commands to said first FIFO
storage unit, and for selectively routing said transmit commands to said second FIFO storage unit.
7. The command and status interface unit of claim 6, wherein said command routing means further comprises status clearing means for generating status clearing signals which are provided to said third and fourth FIFO storage units, and further includes means for routing miscellaneous commands to said medium access control unit.
8. The command and status interface unit of claim 7, which further comprises receive command conversion means for converting the format of each said receive command read out from said first FIFO storage unit and producing a converted receive command which is provided to said medium access control unit, and transmit command conversion means for converting the format of each said transmit command read out from said second FIFO storage unit and producing a converted transmit command which is provided to said medium access control unit.
9. The command and status interface unit of claim 5, wherein said first prespecified processor event is defined as when said processor writes one said receive command into said first FIFO storage unit, and said first prespecified event in said medium access control unit is defined as when said medium access control unit is ready to accept one said receive command.
10. The command and status interface unit of claim 9, wherein said second prespecified processor event is defined as when said processor writes one said transmit command into said second FIFO storage unit, and said second prespecified event in said medium access control unit is defined as when said medium access control unit is ready to accept one said transmit command.
11. The command and status interface unit of claim 10, wherein said third storage unit permits said medium access control unit to write one said set of receive status bits into said FIFO storage unit only after said medium access control unit completes execution of one said receive command.
12. The command and status interface unit of claim 11, wherein said second storage unit permits said medium access control unit to write one said set of transmit status bits into said fourth FIFO storage unit only after said medium access control unit completes execution of one said transmit command.
13. The command and status interface unit of claim 12, wherein said system bus interface unit further comprises interrupt generating means for selected processing of said set of receive status bits read out of said third FIFO
storage unit and said set of transmit status bits read out of said fourth FIFO storage unit, so as to generate interrupts to said processor.
14. The command and status interface unit of claim 5, wherein said plurality of receive command storage locations of said first FIFO storage unit comprises a first insert storage location into which each said receive command can be written, and a first removal storage location from which each said receive command can be read out, said first insert storage location being advanced by said processor writing into said first FIFO storage unit and said first removal storage location being advanced by said medium access control unit reading from said first FIFO
storage unit.
15. The command and status interface unit of claim 14, wherein said plurality of transmit command storage locations of said second FIFO storage unit comprises a second insert storage location into which each said transmit command can be written, and a second removal storage location from which each said transmit command can be read out, said second insert storage location being advanced by said processor writing into said second FIFO storage unit and said second removal storage location being advanced by said medium access control unit reading from said second FIFO storage unit.
16. The command and status interface unit of claim 15, wherein said plurality of receive storage locations of status FIFO storage unit comprises a third insert storage location into which each said set of receive status bits can be written, and a third removal storage location from which each said set of receive status bits can be read out, said third insert storage location being advanced upon the occurrence of a third prespecified event within said medium access control unit, and said third removal storage location being advanced upon the occurrence of a third prespecified processor event.
17. The command and status interface unit of claim 16, wherein said third prespecified event within said medium access control unit is defined as when said medium access control unit writes into said third FIFO storage unit, and wherein said third prespecified processor event is defined as when said processor issues a clear receive command to said third FIFO storage unit.
18. The command and status interface unit of claim 17, wherein said plurality of transmit status storage locations of said fourth FIFO storage unit comprises a fourth insert storage location into which each said set of transmit status bits can be written; and a fourth removal storage location from which each said set of transmit status bits can be read out, said fourth insert storage location being advanced upon the occurrence of a fourth prespecified event within said medium access control unit, and said fourth removal storage location being advanced upon the occurrence of a fourth prespecified event within said medium access control unit.
19. The command and status interface unit of claim 18, wherein said fourth prespecified event within said medium access control unit is defined as when medium access control unit writes into said fourth FIFO storage unit, and wherein said fourth prespecified processor event is defined as when said processor issues a clear transmit command to said fourth FIFO storage unit.
20. A method of buffering receive and transmit commands and status bits within a command and status interface unit of a communication controller having a medium access control unit and being in operable association with a processor, said method comprising the steps of:
(a) maintaining in said command and status interface unit, a receive command queue having a plurality of receive command storage locations, said receive command queue having a first insert storage location at which each receive command can be inserted into said receive command queue, and a first removal storage location from which each receive command can be removed from said receive command queue, each said receive command storage location being capable of storing one said receive command;
(b) maintaining in said command and status interface unit, a transmit command queue having a second plurality of transmit command storage locations, said transmit command queue having a second insert storage location at which each transmit command can be inserted in said transmit command queue, and a second removal storage location from which each transmit command can be removed from said transmit command queue, each said transmit command storage location being capable of storing one said transmit command;
(c) providing a first plurality of receive data packet storage locations for storing at least a first plurality of data packets to be received, each said receive data packet storage location being uniquely associated with one said receive command being stored in said receive command queue;

(d) providing a second plurality of transmit data packet storage locations for storing a second plurality of data packets to be transmitted, each said transmit data packet storage location being uniquely associated with one said transmit command being stored in said transmit command queue;
(e) maintaining in said command and status interface unit, a receive status queue having a plurality of receive status bit storage locations, said receive status queue having a third insert storage location at which each set of receive status bits can be inserted into said receive status queue, and a third removal storage location from which each said set of receive status bits can be removed from said receive status queue, wherein each said receive status bit storage location is uniquely associated with one said receive command; and (f) maintaining in said command and status interface unit, a transmit status queue having a plurality of transmit status bit storage locations, said transmit status queue having a fourth insert storage location at which each set of transmit status bits can be inserted into said transmit status queue, and a fourth removal storage location at which each said set of transmit status bits can be removed from said transmit status queue, wherein each said transmit status bit is uniquely associated with one said transmit command.
21. The method of claim 20, which further comprises advancing said first insert storage location of said receive command queue by said processor writing a receive command into said receive command queue, and advancing said first removal storage location of said receive command queue by said medium access control unit reading a receive command from said receive command queue.
22. The method of claim 21, which further comprises advancing said second insert storage location of said transmit command queue by said processor writing a transmit command into said transmit command queue, and advancing said second removal storage location of said transmit command queue by said medium access control unit reading a transmit command from said transmit command queue.
23. The method of claim 22, which further comprises advancing said third insert storage location of said receive status queue by said medium access control unit writing a set of receive status bits into said receive status queue, and advancing said third removal storage location of said receive status queue by said processor issuing a clear receive command to said receive status queue.
24. The method of claim 23, which further comprises advancing said fourth insert storage location of said transmit status queue by said medium access control unit writing a set of transmit status bits into said transmit status queue, and advancing said fourth removal storage location of said transmit status queue by issuing a clear transmit command to said transmit status queue.
25. The method of claim 20, wherein step (c) further comprises selecting one said receive data packet storage location for storage of a data packet to be received and uniquely associating said selected receive data packet storage location with a receive command, and wherein step (a) further comprises said processor writing said uniquely associated receive command into said first insert storage location of said receive command queue, and said medium access control unit reading a receive command from said first removal storage location when said medium access control unit is free to accept said read receive command for execution.
26. The method of claim 25, wherein step (d) further comprises selecting one said transmit data packet storage location for storage of a data packet to be transmitted and uniquely associating said selected transmit data packet storage location with a transmit command, and wherein step (b) further comprises said processor writing said uniquely associated transmit command into said second insert storage location, and said medium access control unit reading a transmit command from said second removal storage location when said medium access control unit is ready to accept said transmit command for execution.
27. The method of claim 26, wherein step (e) further comprises said medium access control unit writing a set of receive status bits into said third insert storage location, and said receive status queue presenting to said processor for inspection, the set of receive status bits in said third removal storage location.
28. The method of claim 27, wherein step (f) further comprises said medium access control unit writing a set of transmit status bits into said fourth insert storage location, and said transmit status queue presenting to said processor for inspection, the set of transmit status bits in said fourth removal storage location.
29. A data communication controller operably associated with a data packet buffer means having a plurality of data packet storage locations, and a processor having a system bus and desiring access to a communication medium within a local-area network, said data communication controller comprising:
a medium access control unit for controlling the access of said data communication controller to said communication medium;
a command and status interface unit including command buffering means and status buffering means, said command buffering means having a plurality of receive command storage locations, into which one or more receive commands can be written by a processor and selectively read out therefrom by a medium access control unit, each said receive command being uniquely associated with one said data storage packet location, and a plurality of transmit command storage locations, into which one or more transmit commands can be written in by said processor and selectively read out therefrom by said medium access control unit, each said transmit command being uniquely associated with one said data packet storage location, and said status buffering means having a plurality of receive status storage locations, into which a set of receive status bits can be written by said medium access control unit and selectively read out therefrom by said processor, and a plurality of transmit status storage locations, into which a set of transmit status bits can be written in by said medium access control unit and selectively read out therefrom by said processor, said command buffering means and said status buffering means each being operably associatable with said processor and said medium access control unit so as to allow consecutive transmission and reception of said data packets in a manner independent of the operation of said processor; and a system bus interface unit for interfacing said command and status interface unit with the system bus of said processor.
30. The data communication controller of claim 29, wherein said command buffering means comprises a first storage unit and a second storage unit, wherein said first storage unit contains said plurality of receive command storage locations, and said second storage unit contains said plurality of transmit command storage locations, and wherein said status buffering means comprises a third storage unit and a fourth storage unit wherein said third storage unit contains said plurality of receive status storage locations, and said fourth storage unit contains said plurality of transmit status storage locations.
31. The data communication controller of claim 30, wherein said first storage unit permits said processor to write one said receive command from said processor into said first storage unit upon the occurrence of a first prespecified processor event, and further permitting said medium access control unit to read one said receive command out of said first storage unit and into said medium access control unit upon the occurrence of a first prespecified event within said medium access control unit, and wherein said second storage unit permits said processor to write one said transmit command from said processor into said second storage unit upon the occurrence of a second prespecified processor event, and further permitting said medium access control unit to read one said transmit command from said second storage unit into said medium access storage unit upon the occurrence of a second prespecified event within said medium access control unit.
32. The data communication controller of claim 31, wherein said third storage unit permits said medium access control unit to write one said set of receive status bits from said medium access control unit into said third storage unit, and further permitting said processor to read out one said set of receive status bits from said third storage unit and transfer said set of receive status bits to a system bus interface unit, for transfer to said system bus and for selected processing to generate interrupts to said processor, and wherein said fourth storage unit permits said medium access control unit to write one said set of transmit status bits from said medium access control unit into said fourth storage unit, and further permitting said processor to read out one said set of transmit status bits from said fourth storage unit and transfer said set of transmit status bits to said system bus interface unit, for transfer to a system bus and for selected processing to generate interrupts to said processor.
33. The data communication controller of claim 32, wherein said first storage unit comprises a first FIFO
storage unit, said second storage unit comprises a second FIFO storage unit, said third storage unit comprises a third FIFO storage unit, said fourth storage unit comprises a fourth FIFO storage unit.
34. The data communication controller of claim 33, which further comprises command routing means for selectively routing said receive commands to said first FIFO
storage unit, and for selectively routing said transmit commands to said second FIFO storage unit.
35. The data communication controller of claim 34, wherein said command routing means further comprises status clearing means for generating status clearing signals which are provided to said third and fourth FIFO storage units, and further includes means for routing miscellaneous commands to said medium access control unit.
36. The data communication controller of claim 35, which further comprises receive command conversion means for converting the format of each said receive command read out from said first FIFO storage unit and producing a converted receive command which is provided to said medium access control unit, and transmit command conversion means for converting the format of each said transmit command read out from said second FIFO storage unit and producing a converted transmit command which is provided to said medium access control unit.
37. The data communication controller of claim 33, wherein said first prespecified processor event is defined as when said processor writes one said receive command into said first FIFO storage unit, and said first prespecified event in said medium access control unit is defined as when said medium access control unit is ready to accept one said receive command.
38. The data communication controller of claim 37, wherein said second prespecified processor event is defined as when said processor writes one said transmit command into said second FIFO storage unit, and said second prespecified event in said medium access control unit is defined as when said medium access control unit is ready to accept one said transmit command.
39. The data communication controller of claim 38, wherein said third storage unit permits said medium access control unit to write one said set of receive status bits into said FIFO storage unit only after said medium access control unit completes execution of one said receive command.
40. The data communication controller of claim 39, wherein said second storage unit permits said medium access control unit to write one said set of transmit status bits into said fourth FIFO storage unit only after said medium access control unit completes execution of one said transmit command.
41. The data communication processor of claim 33, wherein said system bus interface unit further comprises interrupt generating means for selected processing of said set of receive status bits read out of said third FIFO
storage unit and said set of transmit status bits read out of said fourth FIFO storage unit, so as to generate interrupts to said processor.
42. The data communication controller of claim 33, wherein said plurality of receive command storage locations of said first FIFO storage unit comprises a first insert storage location into which each said receive command can be written, and a first removal storage location from which each said receive command can be read out, said first insert storage location being advanced by said processor writing into said first FIFO storage unit and said first removal storage location being advanced by said medium access control unit reading from said first FIFO
storage unit.
43. The data communication controller of claim 42, wherein said plurality of transmit command storage locations of said second FIFO storage unit comprises a second insert storage location into which each said transmit command can be written, and a second removal storage location from which each said transmit command can be read out, said second insert storage location being advanced by said processor writing into said second FIFO storage unit and said second removal storage location being advanced by said medium access control unit reading from said second FIFO storage unit.
44. The data communication controller of claim 43, wherein said plurality of receive storage locations of status FIFO storage unit comprises a third insert storage location into which each said set of receive status bits can be written, and a third removal storage location from which each said set of receive status bits can be read out, said third insert storage location being advanced upon the occurrence of a third prespecified event within said medium access control unit, and said third removal storage location being advanced upon the occurrence of a third prespecified processor event.
45. The data communication controller of claim 44, wherein said third prespecified event within said medium access control unit is defined as when said medium access control unit writes into said third FIFO storage unit, and wherein said third prespecified processor event is defined as when said processor issues a clear receive command to said third FIFO storage unit.
46. The data communication controller of claim 45, wherein said plurality of transmit status storage locations of said fourth FIFO storage unit comprises a fourth insert storage location into which each said set of transmit status bits can be written; and a fourth removal storage location from which each said set of transmit status bits can be read out, said fourth insert storage location being advanced upon the occurrence of a fourth prespecified event within said medium access control unit, and said fourth removal storage location being advanced upon the occurrence of a fourth prespecified event within said medium access control unit.
47. The data communication controller of claim 46, wherein said fourth prespecified event within said medium access control unit is defined as when said medium access control unit writes into said fourth FIFO storage unit, and wherein said fourth prespecified processor event is defined as when said processor issues a clear transmit command to said fourth FIFO storage unit.
CA002103895A 1991-02-15 1992-01-14 Method and apparatus for controlling data communication operations within stations of a local area network Expired - Fee Related CA2103895C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US07/656,784 US5175732A (en) 1991-02-15 1991-02-15 Method and apparatus for controlling data communication operations within stations of a local-area network
US656,784 1991-02-15
PCT/US1992/000414 WO1992015162A1 (en) 1991-02-15 1992-01-14 Method and apparatus for controlling data communication operations within stations of a local area network

Publications (2)

Publication Number Publication Date
CA2103895A1 CA2103895A1 (en) 1992-08-16
CA2103895C true CA2103895C (en) 2003-08-12

Family

ID=24634553

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002103895A Expired - Fee Related CA2103895C (en) 1991-02-15 1992-01-14 Method and apparatus for controlling data communication operations within stations of a local area network

Country Status (3)

Country Link
US (1) US5175732A (en)
CA (1) CA2103895C (en)
WO (1) WO1992015162A1 (en)

Families Citing this family (198)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69132236T2 (en) * 1990-08-22 2000-11-30 Sanyo Electric Co Transmission control system
DE69232645T2 (en) * 1991-03-29 2003-04-03 Mitsubishi Electric Corp communication device
US5392412A (en) * 1991-10-03 1995-02-21 Standard Microsystems Corporation Data communication controller for use with a single-port data packet buffer
US5412782A (en) 1992-07-02 1995-05-02 3Com Corporation Programmed I/O ethernet adapter with early interrupts for accelerating data transfer
US5434976A (en) * 1992-09-28 1995-07-18 Standard Microsystems Corporation Communications controller utilizing an external buffer memory with plural channels between a host and network interface operating independently for transferring packets between protocol layers
JP2778893B2 (en) * 1993-03-05 1998-07-23 株式会社東芝 Communication control device
US5355375A (en) * 1993-03-18 1994-10-11 Network Systems Corporation Hub controller for providing deterministic access to CSMA local area network
JP3476499B2 (en) * 1993-05-19 2003-12-10 富士通株式会社 Data transfer method
JP3168102B2 (en) * 1993-06-30 2001-05-21 トヨタ自動車株式会社 Communication device
US5802287A (en) * 1993-10-20 1998-09-01 Lsi Logic Corporation Single chip universal protocol multi-function ATM network interface
US5708659A (en) * 1993-10-20 1998-01-13 Lsi Logic Corporation Method for hashing in a packet network switching system
US5446726A (en) * 1993-10-20 1995-08-29 Lsi Logic Corporation Error detection and correction apparatus for an asynchronous transfer mode (ATM) network device
US5448558A (en) * 1994-04-05 1995-09-05 International Business Machines Corporation Method and apparatus for managing packet FIFOS
US5805922A (en) * 1994-05-02 1998-09-08 Motorola, Inc. Queued serial peripheral interface having multiple queues for use in a data processing system
US5603063A (en) * 1994-06-27 1997-02-11 Quantum Corporation Disk drive command queuing method using two memory devices for storing two types of commands separately first before queuing commands in the second memory device
US5588120A (en) * 1994-10-03 1996-12-24 Sanyo Electric Co., Ltd. Communication control system for transmitting, from one data processing device to another, data of different formats along with an identification of the format and its corresponding DMA controller
US5754866A (en) * 1995-05-08 1998-05-19 Nvidia Corporation Delayed interrupts with a FIFO in an improved input/output architecture
US5802278A (en) * 1995-05-10 1998-09-01 3Com Corporation Bridge/router architecture for high performance scalable networking
US5944804A (en) * 1995-09-11 1999-08-31 Intel Corporation Super pipelined architecture for transmit flow in a network controller
US6108713A (en) 1997-02-11 2000-08-22 Xaqti Corporation Media access control architectures and network management systems
US6230245B1 (en) 1997-02-11 2001-05-08 Micron Technology, Inc. Method and apparatus for generating a variable sequence of memory device command signals
US6175894B1 (en) 1997-03-05 2001-01-16 Micron Technology, Inc. Memory device command buffer apparatus and method and memory devices and computer systems using same
US5996043A (en) 1997-06-13 1999-11-30 Micron Technology, Inc. Two step memory device command buffer apparatus and method and memory devices and computer systems using same
US6484244B1 (en) 1997-06-17 2002-11-19 Micron Technology, Inc. Method and system for storing and processing multiple memory commands
US6202119B1 (en) * 1997-12-19 2001-03-13 Micron Technology, Inc. Method and system for processing pipelined memory commands
US7055151B1 (en) * 1998-04-03 2006-05-30 Applied Micro Circuits Corporation Systems and methods for multi-tasking, resource sharing and execution of computer instructions
KR100546560B1 (en) * 1998-05-06 2006-04-21 엘지전자 주식회사 Mac primitive in mobile communication
FR2778762B1 (en) * 1998-05-14 2000-12-08 Sgs Thomson Microelectronics MICROPROCESSOR INTERFACE WITH AN EXTERNAL MEMORY OPTIMIZED BY AN EARLY DECODING SYSTEM
US6175905B1 (en) 1998-07-30 2001-01-16 Micron Technology, Inc. Method and system for bypassing pipelines in a pipelined memory command generator
US6178488B1 (en) 1998-08-27 2001-01-23 Micron Technology, Inc. Method and apparatus for processing pipelined memory commands
US6493750B1 (en) * 1998-10-30 2002-12-10 Agilent Technologies, Inc. Command forwarding: a method for optimizing I/O latency and throughput in fibre channel client/server/target mass storage architectures
US6529519B1 (en) 1998-12-22 2003-03-04 Koninklijke Philips Electronics N.V. Prioritized-buffer management for fixed sized packets in multimedia application
US6928494B1 (en) * 2000-03-29 2005-08-09 Intel Corporation Method and apparatus for timing-dependant transfers using FIFOs
US7010579B1 (en) * 2000-09-26 2006-03-07 Cisco Technology, Inc. Direct data routing system
US7130927B2 (en) * 2001-07-05 2006-10-31 International Business Machines Corporation Method of bandwidth management between the stations of a local area network
US6614695B2 (en) * 2001-08-24 2003-09-02 Micron Technology, Inc. Non-volatile memory with block erase
US7257630B2 (en) 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7543056B2 (en) 2002-01-15 2009-06-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
US6889262B1 (en) * 2002-06-26 2005-05-03 Advanced Micro Devices, Inc. Direct transaction mode for peripheral devices
US7296067B2 (en) * 2002-12-19 2007-11-13 Research In Motion Limited Wireless/LAN router queuing method and system
US7627891B2 (en) 2003-02-14 2009-12-01 Preventsys, Inc. Network audit and policy assurance system
US8091117B2 (en) 2003-02-14 2012-01-03 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US8898788B1 (en) 2004-04-01 2014-11-25 Fireeye, Inc. Systems and methods for malware attack prevention
US8881282B1 (en) 2004-04-01 2014-11-04 Fireeye, Inc. Systems and methods for malware attack detection and identification
US8204984B1 (en) 2004-04-01 2012-06-19 Fireeye, Inc. Systems and methods for detecting encrypted bot command and control communication channels
US8561177B1 (en) 2004-04-01 2013-10-15 Fireeye, Inc. Systems and methods for detecting communication channels of bots
US8549638B2 (en) 2004-06-14 2013-10-01 Fireeye, Inc. System and method of containing computer worms
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US8793787B2 (en) 2004-04-01 2014-07-29 Fireeye, Inc. Detecting malicious network content using virtual environment components
US8006305B2 (en) * 2004-06-14 2011-08-23 Fireeye, Inc. Computer worm defense system and method
US9106694B2 (en) 2004-04-01 2015-08-11 Fireeye, Inc. Electronic message analysis for malware detection
US8375444B2 (en) 2006-04-20 2013-02-12 Fireeye, Inc. Dynamic signature creation and enforcement
US8171553B2 (en) 2004-04-01 2012-05-01 Fireeye, Inc. Heuristic based capture with replay to virtual machine
US8528086B1 (en) 2004-04-01 2013-09-03 Fireeye, Inc. System and method of detecting computer worms
US8539582B1 (en) 2004-04-01 2013-09-17 Fireeye, Inc. Malware containment and security analysis on connection
US9027135B1 (en) 2004-04-01 2015-05-05 Fireeye, Inc. Prospective client identification using malware attack detection
US7587537B1 (en) 2007-11-30 2009-09-08 Altera Corporation Serializer-deserializer circuits formed from input-output circuit registers
US8566946B1 (en) 2006-04-20 2013-10-22 Fireeye, Inc. Malware containment on connection
US8997219B2 (en) 2008-11-03 2015-03-31 Fireeye, Inc. Systems and methods for detecting malicious PDF network content
US8850571B2 (en) 2008-11-03 2014-09-30 Fireeye, Inc. Systems and methods for detecting malicious network content
US8832829B2 (en) 2009-09-30 2014-09-09 Fireeye, Inc. Network-based binary file extraction and analysis for malware detection
US9519782B2 (en) 2012-02-24 2016-12-13 Fireeye, Inc. Detecting malicious network content
US10572665B2 (en) 2012-12-28 2020-02-25 Fireeye, Inc. System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9159035B1 (en) 2013-02-23 2015-10-13 Fireeye, Inc. Framework for computer application analysis of sensitive information tracking
US9176843B1 (en) 2013-02-23 2015-11-03 Fireeye, Inc. Framework for efficient security coverage of mobile software applications
US9824209B1 (en) 2013-02-23 2017-11-21 Fireeye, Inc. Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
US8990944B1 (en) 2013-02-23 2015-03-24 Fireeye, Inc. Systems and methods for automatically detecting backdoors
US9367681B1 (en) 2013-02-23 2016-06-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9009822B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for multi-phase analysis of mobile applications
US9195829B1 (en) 2013-02-23 2015-11-24 Fireeye, Inc. User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9009823B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications installed on mobile devices
US9104867B1 (en) 2013-03-13 2015-08-11 Fireeye, Inc. Malicious content analysis using simulated user interaction without user involvement
US9626509B1 (en) 2013-03-13 2017-04-18 Fireeye, Inc. Malicious content analysis with multi-version application support within single operating environment
US9355247B1 (en) 2013-03-13 2016-05-31 Fireeye, Inc. File extraction from memory dump for malicious content analysis
US9565202B1 (en) 2013-03-13 2017-02-07 Fireeye, Inc. System and method for detecting exfiltration content
US9311479B1 (en) 2013-03-14 2016-04-12 Fireeye, Inc. Correlation and consolidation of analytic data for holistic view of a malware attack
US9430646B1 (en) 2013-03-14 2016-08-30 Fireeye, Inc. Distributed systems and methods for automatically detecting unknown bots and botnets
US9251343B1 (en) 2013-03-15 2016-02-02 Fireeye, Inc. Detecting bootkits resident on compromised computers
US10713358B2 (en) 2013-03-15 2020-07-14 Fireeye, Inc. System and method to extract and utilize disassembly features to classify software intent
US9413781B2 (en) 2013-03-15 2016-08-09 Fireeye, Inc. System and method employing structured intelligence to verify and contain threats at endpoints
US9495180B2 (en) 2013-05-10 2016-11-15 Fireeye, Inc. Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en) 2013-05-13 2017-04-25 Fireeye, Inc. Classifying sets of malicious indicators for detecting command and control communications associated with malware
US9536091B2 (en) 2013-06-24 2017-01-03 Fireeye, Inc. System and method for detecting time-bomb malware
US10133863B2 (en) 2013-06-24 2018-11-20 Fireeye, Inc. Zero-day discovery system
US9888016B1 (en) 2013-06-28 2018-02-06 Fireeye, Inc. System and method for detecting phishing using password prediction
US9300686B2 (en) 2013-06-28 2016-03-29 Fireeye, Inc. System and method for detecting malicious links in electronic messages
US10192052B1 (en) 2013-09-30 2019-01-29 Fireeye, Inc. System, apparatus and method for classifying a file as malicious using static scanning
US9628507B2 (en) 2013-09-30 2017-04-18 Fireeye, Inc. Advanced persistent threat (APT) detection center
US9171160B2 (en) 2013-09-30 2015-10-27 Fireeye, Inc. Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9736179B2 (en) 2013-09-30 2017-08-15 Fireeye, Inc. System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9294501B2 (en) 2013-09-30 2016-03-22 Fireeye, Inc. Fuzzy hash of behavioral results
US10515214B1 (en) 2013-09-30 2019-12-24 Fireeye, Inc. System and method for classifying malware within content created during analysis of a specimen
US9690936B1 (en) 2013-09-30 2017-06-27 Fireeye, Inc. Multistage system and method for analyzing obfuscated content for malware
US10089461B1 (en) 2013-09-30 2018-10-02 Fireeye, Inc. Page replacement code injection
US9921978B1 (en) 2013-11-08 2018-03-20 Fireeye, Inc. System and method for enhanced security of storage devices
US9189627B1 (en) 2013-11-21 2015-11-17 Fireeye, Inc. System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US9747446B1 (en) 2013-12-26 2017-08-29 Fireeye, Inc. System and method for run-time object classification
US9756074B2 (en) 2013-12-26 2017-09-05 Fireeye, Inc. System and method for IPS and VM-based detection of suspicious objects
US9507935B2 (en) 2014-01-16 2016-11-29 Fireeye, Inc. Exploit detection system with threat-aware microvisor
US9262635B2 (en) 2014-02-05 2016-02-16 Fireeye, Inc. Detection efficacy of virtual machine-based analysis with application specific events
US9241010B1 (en) 2014-03-20 2016-01-19 Fireeye, Inc. System and method for network behavior detection
US10242185B1 (en) 2014-03-21 2019-03-26 Fireeye, Inc. Dynamic guest image creation and rollback
US9591015B1 (en) 2014-03-28 2017-03-07 Fireeye, Inc. System and method for offloading packet processing and static analysis operations
US9223972B1 (en) 2014-03-31 2015-12-29 Fireeye, Inc. Dynamically remote tuning of a malware content detection system
US9432389B1 (en) 2014-03-31 2016-08-30 Fireeye, Inc. System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9973531B1 (en) 2014-06-06 2018-05-15 Fireeye, Inc. Shellcode detection
US9438623B1 (en) 2014-06-06 2016-09-06 Fireeye, Inc. Computer exploit detection using heap spray pattern matching
US9594912B1 (en) 2014-06-06 2017-03-14 Fireeye, Inc. Return-oriented programming detection
US10084813B2 (en) 2014-06-24 2018-09-25 Fireeye, Inc. Intrusion prevention and remedy system
US9398028B1 (en) 2014-06-26 2016-07-19 Fireeye, Inc. System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US10805340B1 (en) 2014-06-26 2020-10-13 Fireeye, Inc. Infection vector and malware tracking with an interactive user display
US10002252B2 (en) 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9363280B1 (en) 2014-08-22 2016-06-07 Fireeye, Inc. System and method of detecting delivery of malware using cross-customer data
US10671726B1 (en) 2014-09-22 2020-06-02 Fireeye Inc. System and method for malware analysis using thread-level event monitoring
US9773112B1 (en) 2014-09-29 2017-09-26 Fireeye, Inc. Exploit detection of malware and malware families
US10027689B1 (en) 2014-09-29 2018-07-17 Fireeye, Inc. Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9690933B1 (en) 2014-12-22 2017-06-27 Fireeye, Inc. Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en) 2014-12-26 2018-09-11 Fireeye, Inc. Zero-day rotating guest image profile
US9934376B1 (en) 2014-12-29 2018-04-03 Fireeye, Inc. Malware detection appliance architecture
US9838417B1 (en) 2014-12-30 2017-12-05 Fireeye, Inc. Intelligent context aware user interaction for malware detection
US9690606B1 (en) 2015-03-25 2017-06-27 Fireeye, Inc. Selective system call monitoring
US10148693B2 (en) 2015-03-25 2018-12-04 Fireeye, Inc. Exploit detection system
US9438613B1 (en) 2015-03-30 2016-09-06 Fireeye, Inc. Dynamic content activation for automated analysis of embedded objects
US10417031B2 (en) 2015-03-31 2019-09-17 Fireeye, Inc. Selective virtualization for security threat detection
US10474813B1 (en) 2015-03-31 2019-11-12 Fireeye, Inc. Code injection technique for remediation at an endpoint of a network
US9483644B1 (en) 2015-03-31 2016-11-01 Fireeye, Inc. Methods for detecting file altering malware in VM based analysis
US9654485B1 (en) 2015-04-13 2017-05-16 Fireeye, Inc. Analytics-based security monitoring system and method
US9594904B1 (en) 2015-04-23 2017-03-14 Fireeye, Inc. Detecting malware based on reflection
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10454950B1 (en) 2015-06-30 2019-10-22 Fireeye, Inc. Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US11113086B1 (en) 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10715542B1 (en) 2015-08-14 2020-07-14 Fireeye, Inc. Mobile application risk analysis
US10176321B2 (en) 2015-09-22 2019-01-08 Fireeye, Inc. Leveraging behavior-based rules for malware family classification
US10033747B1 (en) 2015-09-29 2018-07-24 Fireeye, Inc. System and method for detecting interpreter-based exploit attacks
US9825976B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Detection and classification of exploit kits
US10817606B1 (en) 2015-09-30 2020-10-27 Fireeye, Inc. Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US9825989B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Cyber attack early warning system
US10706149B1 (en) 2015-09-30 2020-07-07 Fireeye, Inc. Detecting delayed activation malware using a primary controller and plural time controllers
US10601865B1 (en) 2015-09-30 2020-03-24 Fireeye, Inc. Detection of credential spearphishing attacks using email analysis
US10210329B1 (en) 2015-09-30 2019-02-19 Fireeye, Inc. Method to detect application execution hijacking using memory protection
US10284575B2 (en) 2015-11-10 2019-05-07 Fireeye, Inc. Launcher for setting analysis environment variations for malware detection
US10447728B1 (en) 2015-12-10 2019-10-15 Fireeye, Inc. Technique for protecting guest processes using a layered virtualization architecture
US10846117B1 (en) 2015-12-10 2020-11-24 Fireeye, Inc. Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10108446B1 (en) 2015-12-11 2018-10-23 Fireeye, Inc. Late load technique for deploying a virtualization layer underneath a running operating system
US10133866B1 (en) 2015-12-30 2018-11-20 Fireeye, Inc. System and method for triggering analysis of an object for malware in response to modification of that object
US10050998B1 (en) 2015-12-30 2018-08-14 Fireeye, Inc. Malicious message analysis system
US10565378B1 (en) 2015-12-30 2020-02-18 Fireeye, Inc. Exploit of privilege detection framework
US10621338B1 (en) 2015-12-30 2020-04-14 Fireeye, Inc. Method to detect forgery and exploits using last branch recording registers
US11552986B1 (en) 2015-12-31 2023-01-10 Fireeye Security Holdings Us Llc Cyber-security framework for application of virtual features
US9824216B1 (en) 2015-12-31 2017-11-21 Fireeye, Inc. Susceptible environment detection system
US10581874B1 (en) 2015-12-31 2020-03-03 Fireeye, Inc. Malware detection system with contextual analysis
US10601863B1 (en) 2016-03-25 2020-03-24 Fireeye, Inc. System and method for managing sensor enrollment
US10785255B1 (en) 2016-03-25 2020-09-22 Fireeye, Inc. Cluster configuration within a scalable malware detection system
US10671721B1 (en) 2016-03-25 2020-06-02 Fireeye, Inc. Timeout management services
US10476906B1 (en) 2016-03-25 2019-11-12 Fireeye, Inc. System and method for managing formation and modification of a cluster within a malware detection system
US10893059B1 (en) 2016-03-31 2021-01-12 Fireeye, Inc. Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10169585B1 (en) 2016-06-22 2019-01-01 Fireeye, Inc. System and methods for advanced malware detection through placement of transition events
US10462173B1 (en) 2016-06-30 2019-10-29 Fireeye, Inc. Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US10491627B1 (en) 2016-09-29 2019-11-26 Fireeye, Inc. Advanced malware detection using similarity analysis
US10795991B1 (en) 2016-11-08 2020-10-06 Fireeye, Inc. Enterprise search
US10587647B1 (en) 2016-11-22 2020-03-10 Fireeye, Inc. Technique for malware detection capability comparison of network security devices
US10581879B1 (en) 2016-12-22 2020-03-03 Fireeye, Inc. Enhanced malware detection for generated objects
US10552610B1 (en) 2016-12-22 2020-02-04 Fireeye, Inc. Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10523609B1 (en) 2016-12-27 2019-12-31 Fireeye, Inc. Multi-vector malware detection and analysis
US10904286B1 (en) 2017-03-24 2021-01-26 Fireeye, Inc. Detection of phishing attacks using similarity analysis
US10554507B1 (en) 2017-03-30 2020-02-04 Fireeye, Inc. Multi-level control for enhanced resource and object evaluation management of malware detection system
US10791138B1 (en) 2017-03-30 2020-09-29 Fireeye, Inc. Subscription-based malware detection
US10902119B1 (en) 2017-03-30 2021-01-26 Fireeye, Inc. Data extraction system for malware analysis
US10798112B2 (en) 2017-03-30 2020-10-06 Fireeye, Inc. Attribute-controlled malware detection
US10855700B1 (en) 2017-06-29 2020-12-01 Fireeye, Inc. Post-intrusion detection of cyber-attacks during lateral movement within networks
US10601848B1 (en) 2017-06-29 2020-03-24 Fireeye, Inc. Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10503904B1 (en) 2017-06-29 2019-12-10 Fireeye, Inc. Ransomware detection and mitigation
US10893068B1 (en) 2017-06-30 2021-01-12 Fireeye, Inc. Ransomware file modification prevention technique
US10747872B1 (en) 2017-09-27 2020-08-18 Fireeye, Inc. System and method for preventing malware evasion
US10805346B2 (en) 2017-10-01 2020-10-13 Fireeye, Inc. Phishing attack detection
US11108809B2 (en) 2017-10-27 2021-08-31 Fireeye, Inc. System and method for analyzing binary code for malware classification using artificial neural network techniques
US11005860B1 (en) 2017-12-28 2021-05-11 Fireeye, Inc. Method and system for efficient cybersecurity analysis of endpoint events
US11240275B1 (en) 2017-12-28 2022-02-01 Fireeye Security Holdings Us Llc Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11271955B2 (en) 2017-12-28 2022-03-08 Fireeye Security Holdings Us Llc Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US10826931B1 (en) 2018-03-29 2020-11-03 Fireeye, Inc. System and method for predicting and mitigating cybersecurity system misconfigurations
US10956477B1 (en) 2018-03-30 2021-03-23 Fireeye, Inc. System and method for detecting malicious scripts through natural language processing modeling
US11003773B1 (en) 2018-03-30 2021-05-11 Fireeye, Inc. System and method for automatically generating malware detection rule recommendations
US11558401B1 (en) 2018-03-30 2023-01-17 Fireeye Security Holdings Us Llc Multi-vector malware detection data sharing system for improved detection
US11314859B1 (en) 2018-06-27 2022-04-26 FireEye Security Holdings, Inc. Cyber-security system and method for detecting escalation of privileges within an access token
US11075930B1 (en) 2018-06-27 2021-07-27 Fireeye, Inc. System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11228491B1 (en) 2018-06-28 2022-01-18 Fireeye Security Holdings Us Llc System and method for distributed cluster configuration monitoring and management
US11316900B1 (en) 2018-06-29 2022-04-26 FireEye Security Holdings Inc. System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US11182473B1 (en) 2018-09-13 2021-11-23 Fireeye Security Holdings Us Llc System and method for mitigating cyberattacks against processor operability by a guest process
US11763004B1 (en) 2018-09-27 2023-09-19 Fireeye Security Holdings Us Llc System and method for bootkit detection
US11368475B1 (en) 2018-12-21 2022-06-21 Fireeye Security Holdings Us Llc System and method for scanning remote services to locate stored objects with malware
US11258806B1 (en) 2019-06-24 2022-02-22 Mandiant, Inc. System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en) 2019-06-27 2023-01-17 Mandiant, Inc. Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en) 2019-06-28 2022-07-19 Fireeye Security Holdings Us Llc System and method for supporting cross-platform data verification
US11886585B1 (en) 2019-09-27 2024-01-30 Musarubra Us Llc System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en) 2019-09-30 2023-04-25 Mandiant, Inc. System and method for surfacing cyber-security threats with a self-learning recommendation engine

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0036864B1 (en) * 1979-10-09 1984-10-03 BURROUGHS CORPORATION (a Michigan corporation) Data communications controller
IT1155575B (en) * 1982-07-27 1987-01-28 Cselt Centro Studi Lab Telecom MULTIPLE INTERFACE OF COMMUNICATION BETWEEN PROCESS PROCESSOR AND NUMERIC TRANSMISSION VEHICLE
GB8304950D0 (en) * 1983-02-22 1983-03-23 Int Computers Ltd Data communication systems
US4567595A (en) * 1983-03-31 1986-01-28 At&T Bell Laboratories Multiline error detection circuit
US4577314A (en) * 1983-03-31 1986-03-18 At&T Bell Laboratories Digital multi-customer data interface
US4593281A (en) * 1983-10-13 1986-06-03 Rockwell International Corporation Local area network interframe delay controller
US4630261A (en) * 1984-07-30 1986-12-16 International Business Machines Corp. Integrated buffer management and signaling technique
US4808155A (en) * 1986-02-27 1989-02-28 Mahurkar Sakharam D Simple double lumen catheter
US4704717A (en) * 1986-07-22 1987-11-03 Prime Computer, Inc. Receive message processor for a solicited message packet transfer system
US4855904A (en) * 1986-08-27 1989-08-08 Amdahl Corporation Cache storage queue

Also Published As

Publication number Publication date
US5175732A (en) 1992-12-29
WO1992015162A1 (en) 1992-09-03
CA2103895A1 (en) 1992-08-16

Similar Documents

Publication Publication Date Title
CA2103895C (en) Method and apparatus for controlling data communication operations within stations of a local area network
EP0619036B1 (en) Method and apparatus for processing data within stations of a communication network
EP0582666B1 (en) Method and apparatus for buffering data within stations of a communication network
US5396490A (en) Packet reassembly method and apparatus
EP0272834B1 (en) Inter-processor communication protocol
US5604866A (en) Flow control system having a counter in transmitter for decrementing and incrementing based upon transmitting and received message size respectively for indicating free space in receiver
US9807025B2 (en) System and method for ordering of data transferred over multiple channels
EP0777948B1 (en) Duplicate message detection method and apparatus
JP3340738B2 (en) Method and apparatus for a parallel packet bus
US5151895A (en) Terminal server architecture
KR970029126A (en) Multiprocessor system
JPH03130863A (en) Control-element transfer system
GB2282474A (en) Buffer memory management for a computer network.
EP0496177A1 (en) Method of transmitting data by buffer chaining between a host computer and a communication controller
GB2365596A (en) Transfer acknowledgement in a bus system
EP0512290A2 (en) Nested frame communication protocol
KR920004771B1 (en) Bus flow control mechanism
US6105071A (en) Source and destination initiated interrupt system for message arrival notification
US4612541A (en) Data transmission system having high-speed transmission procedures
US6098105A (en) Source and destination initiated interrupt method for message arrival notification
JP3799741B2 (en) Bus controller
JP2998186B2 (en) Data transfer device
JP3023339B2 (en) Message arrival notification method and system
JPH0576821B2 (en)
JP2004054419A (en) Inter-node transaction processor

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed