WO1990013956A1 - Distributed intelligence network using time and frequency multiplexing - Google Patents

Distributed intelligence network using time and frequency multiplexing Download PDF

Info

Publication number
WO1990013956A1
WO1990013956A1 PCT/US1989/001806 US8901806W WO9013956A1 WO 1990013956 A1 WO1990013956 A1 WO 1990013956A1 US 8901806 W US8901806 W US 8901806W WO 9013956 A1 WO9013956 A1 WO 9013956A1
Authority
WO
WIPO (PCT)
Prior art keywords
sep
node
timeslot
transmitting
network
Prior art date
Application number
PCT/US1989/001806
Other languages
French (fr)
Inventor
Chi-Chi Chu
Shanobhog Sangameswara
Peter Paul Lugtu Vita
Michael Ouye
David R. F. Stevens
Celeste Baranski
Cai U. Monsson
Timothy Patrick Murphy
Kevin Thomas Murphy
Alan Saldinger
Robert J. Cringle
Robert P. Mcnamara
Gary M. Ellis
Ranjit Ghate
Original Assignee
First Pacific Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by First Pacific Networks, Inc. filed Critical First Pacific Networks, Inc.
Priority to PCT/US1989/001806 priority Critical patent/WO1990013956A1/en
Priority to JP50875889A priority patent/JPH04506729A/en
Priority to EP19890909268 priority patent/EP0470072A4/en
Publication of WO1990013956A1 publication Critical patent/WO1990013956A1/en
Priority to KR91701479A priority patent/KR970008669B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/14Two-way operation using the same type of signal, i.e. duplex
    • H04L5/143Two-way operation using the same type of signal, i.e. duplex for modulated signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J4/00Combined time-division and frequency-division multiplex systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2801Broadband local area networks

Abstract

A distributed intelligence network (10) using time and frequency domain multiplexing. On power-up, each node (20) determines its skew and requests downloading of program code and configuration data. A node claims timeslots by transmitting a packet into an apparently empty timeslot and verifying receipt of its own packet.

Description


  
 



   DISTRIBUTED INTELLIGENCE NETWORK
 USING TIME AND FREOUENCY MULTIPLEXING
 BACKGROUND OF THE INVENTION
 The invention relates to communication networks and, more particularly, to a distributed intelligence network using time and frequency multiplexing.



   Many office telephone systems are based on a private branch exchange (PBX) wherein all telephones are connected to a central switching device ("switch"). The switch provides connections amongst the various on-site telephones (extensions) and connections between on-site telephones and the public switched networks. So that it may support the various features (call waiting, call forwarding, conferencing, etc.) that many users have come to expect and require, the switch has had to become a rather powerful computer with a large amount of complex software. The telephones have also become more complex, and software for certain of the features are programmed locally at each phone.



   The PBX system works well for the most part.



  However, since every communication must go through the switch, a malfunction at that point may well have the effect of shutting down the entire system. Moreover, unless the system is configured with dual processors, modification of the switch software and configuration data may require that the whole system must be shut down.



   For data communications, several different architectures are used. In a star network, all the terminals are coupled to a central point of the star, which provides centralized control of the flow of data.



  The central control on such a system can time-division  multiplex data from different terminals by alternately holding data from one or the other transmitting terminal in a buffer until its timeslot is available. The central control unit provides the synchronization necessary to insert the data into the respective time slots.



  Unfortunately, the star network suffers from several disadvantages. The bandwidth available through the switch matrix is limited, as well the integrity of the data passing through the switch. Furthermore, it is difficult to lay out the wires, because a new wire from the central control to the telephone must be laid each time a new telephone is added. In addition, a failure of the centralized control system disables the entire system.



   Another data system architecture, and one which is easier to lay out, is a ring network. In a ring network, a single cable passes through each and every data terminal, and thus, network bandwidth is shared.



  Rather than rely on assigned timeslots or the acquisition of timeslots, bandwidth multiplexing employs the token method. In this method, a token is passed from one terminal to another, with the terminal desiring to transmit holding onto the token. A terminal cannot transmit unless it has the token, and therefore only one terminal will be transmitting at a time. This type of time-division multiplexing thus transmits data in irregular bursts, rather than regular assigned timeslot lengths. This type of transmission is appropriate for data communications, which typically occur in infrequent, long bursts. Voice communications, on the other hand, require a continuous connection over an extended period of time.



   An alternative architecture for preventing errors due to two users attempting to acquire the network bandwidth simultaneously is used in the Ethernet system.



  In this system, before a terminal may transmit it listens  to see if the network bandwidth is being used. Then while transmitting, the data terminal listens to   determine -if    the data transmitted is received in the same form. If the received data differs, then another terminal transmitted at the same time, resulting in a collision and thus scrambled data. The transmitting station then stops transmitting and retransmits a random amount of time later. Thus, central control of the network bandwidth acquisition of timeslots is not needed.



  Because data transmissions occur infrequently, the chances of a collision on the second transmission are low. The chance of a collision increase as the number of terminals coupled to the system increases. Such a system is ill suited for voice traffic since the number of collisions will increase for voice communications which require continuous transmissions over an extended period of time. Additionally, the delay through the network is not fixed.



   One approach which combines voice and data not using the private branch exchange is disclosed in Patent
No. 4,470,140 to Coffey, entitled "Distributed Switching
Network (DSN)." The DSN system is built around a multiple bus network. In the DSN system, the communication media consists of twisted pair. For the network to operate properly, at least three pairs of cabling must be laid out. This cabling acts as the backbone for the DSN system. One pair is used for transmitting information toward the Line Group Central
Shelf and the other two pairs are used in a loop back arrangement for receiving transmissions from either other units or remote units through the Line Group Central
Shelf. Each transmit and receive line is subdivided into frames and further subdivided into timeslots.



  Communication between any two units in this network requires that each unit seize a timeslot for its own transmission needs and that it receive and read the  timeslot of the other to provide two way communication.



  One of the major assumptions of the DSN system is that the buses are synchronous, that is, no allowances are made on the bus for signalling overhead or time of flight. Each timeslot has been partitioned to accept one byte of information, and thus, there is no room for timing errors.



   The DSN system itself consists of two major units, Parallel Access Communications Interface Blocks (PIBs) and the Line Group Central Shelf. The PIBs are used to interface communication equipment to the network.



  The PIBs are connected in parallel across the transmit lines and across the upstream portion of the looped back receive lines. The implication of the parallel access is significant in that when a PIB transmits onto the common transmit bus, the transmission is sent both upstream and downstream. The Line Group Interface Shelf (LGIS) is the terminus point for all of the cabling in the DSN System.

 

  The LGIS provides network timing, switching between transmit and receive lines, switching between in-house calls and the Public Switched Telephone Network, as well as all of the network control functions.



   When a PIB wishes to transmit information, two events occur. The PIB Transmit Line first derives timing information so as to identify when to transmit on the transmit bus. This timing information is generated by the Line Group Central Shelf and sent out on the receive line. By examining the status of the receive and the transmit lines, the PIB is able to ascertain that a particular timeslot is available. This determination of whether a times lot is available is completely dependent on the parallel connection of the PIB to both the transmit and receive lines.



   SUMMARY OF THE INVENTION  
General
 The present invention is directed to a distributed communications network which provides numerous advantages over known communication systems.



  The apparatus and methods according to the present invention operate on a single communications medium yet provide a broad band network facility which can support all of the voice, data and video communications needs of a particular user. To do this, each node in the network may assign traffic type (voice, data and video) to a different portion of the network medium's RF spectrum.



  Each separate frequency band thus comprises a subnetwork.



  Subnetworks may be designed and engineered for specific services and a particular grade of service. For example, data networks can be designed and engineered for high speed transport, network availability, and/or data integrity. Partitioning the communication services in this way allows the subnetworks to be administered and run by separate entities (e.g. the telecommunications department and the data processing department) each independent of the other (provided, of course, that each does not overlap the other's frequency domain).



   The apparatus according to the present invention is modular and incrementally expandable. The interconnect is designed for easy installation, and user equipment can be added or moved without trained service personnel, network reconfiguration, or software changes.



  Because of the distributed nature of the interconnect, any failure of a single element will not effect the operation of the remaining network. Thus, network additions, deletions, or modifications are transparent from an overall network performance and operational perspective. The independence of services between subnetworks also allows the interconnect to be expanded and modified independent of the other subnetwork services. For example, if a business' data requirements  were to expand, additional network attachments may be made completely independent of the voice and video circuits already attached to the system. Older local area data networks (i.e. the network interface units, not the network medium) can be retired and replaced with newer, higher speed, more cost effective equipment, without effecting either the voice or video portions of the interconnect system.



   In a preferred embodiment, the invention is implemented in a voice system that uses time domain multiplexing. A timing mark generator broadcasts periodic timing marks that define a series of frames; a leading portion of each frame defines a signalling packet interval and a later portion of the frame defines a number of timeslots. The frame rate and timeslot width are such that one direction of a voice communication can be supported on a single timeslot on alternating frames.



  The other direction is supported on the same times lot on the interleaved alternating frames.



   The intelligence is distributed and each node has its own operating software and configuration data, which are stored in RAM. This software and data may be updated from time to time, and may be lost in the event of power loss. Each node also has a boot ROM in which is stored a small amount of software to enable the node, at power up, to participate in the acquisition of the full operating software and data.



  Boot Protocols
 The present invention provides a technique for providing boot images (operating software and configuration data) to network nodes in a distributed commuting/communications environment. The protocols for providing boot images to nodes can be carried out with minimum disruption to ongoing network operation in the event that only some of the nodes require service. The  boot process is both general and specific, it can boot either a specific node or the entire network concurrently.



   The system includes one or more network boot units ("NBU's") whose function is to maintain the operating software and configuration data in non-volatile memory (such as hard disk), and transfer copies (referred to as boot images) to the nodes at power up or for updates. For boot operations, the timeslots, normally reserved for voice, are used for data transmission.



   In order to transmit boot images to a selected group of network nodes, referred to as boot consumers, the NBU must receive a boot request from a boot consumer.



  The NBU then broadcasts a boot control signalling packet ("BCSP") having an image descriptor portion that describes the boot image to be transmitted and a control portion that identifies the packet as a BCSP, specifies the class of boot consumers, and designates the timeslot(s) in which the boot image is to be transmitted.



  During the transmission of a boot image, the NBU periodically sends out BCSP's so that boot consumers that were not in a position to receive the boot image at the beginning of the transmission can pick up in midstream.



   A boot consumer requiring a boot image has executable code in boot ROM, whereupon it listens for
BCSP's from the NBU, determines whether any detected
BCSP's specify the desired type of boot image, and if so, causes data appearing in the appropriate timeslots to be read into local memory. Once the boot image has been read in, the node can begin executing it. If a BCSP specifying the desired type of boot image is not detected within a certain time, the boot consumer sends a boot request signalling packet   ("BRSP"),    and continues to listen for a BCSP specifying the desired type.



   Each boot consumer is programmed to have a random wait period before sending out a BRSP. Thus, if  there are many nodes requiring the same type of boot image, the earliest boot request will be responded to by the NBU, thereby obviating the need for further boot requests by other units programmed to make their requests later.



   If the system contains more than one NBU, the first NBU to receive the request, assuming it has the requested boot image and is not currently downloading a boot image, services the request in the manner described above. NBU's arbitrate amongst themselves to determine which of them is to respond to a given incoming request.



  Each NBU sends a BCSP that identifies the sending NBU but specifies no time frames to be allocated. Each NBU then listens for BCSP's, and in the event that it first receives its own BCSP, it assumes responsibility. If it first receives a BCSP that originated from another NBU, it does not attempt to service the request.



  Skew Calculation
 The present invention provides a network having a wide bandwidth communications channel. This channel is organized architecturally as a time-ordered bus. All the nodes of the system are coupled to both the transmitting medium and the receiving medium. The network bandwidth is subdivided into timeslots. Timeslots are defined by a timing mark generator, with each node detecting the timing marks on only the receiving medium. The time between each timing mark defines a frame, with each frame consisting of a plurality of timeslots. In this network, each node may be a different physical distance from a central turnaround point or head-end, resulting in each node transmitting in a different time relative to the received timing mark due to the differences in transmission time to the head-end and back. 

  Accordingly, each node transmits a test signal and measures the time after the transmission until it receives the test signal  back again. This time, designated a skew time, is used for transmissions of information. In all subsequent transmissions, each node transmits at a time equal to the skew time in advance of the timeslot it is attempting to transmit into.



   The network employed in this invention is medium independent. In one embodiment, the transmission medium is a broadband CATV cable with a transmitting and receiving channel defined by different frequency bands.



  The head-end of the system includes a frequency translator for translating the transmitted signal from the transmitting channel onto the receiving frequency band of the receiving channel. The system permits multiple channels, increasing the number of users that can be attached to the system. Information is transmitted asynchronously within a timeslot, thus eliminating the need for precise synchronization to place a transmission packet within a specified timeslot. Each channel may contain a plurality of signalling timeslots and voice transmission timeslots. Each frame preferably has a first portion assigned for signalling packets and then a plurality of timeslots for voice communications.



  When one node desires to call another, an identifying signal is transmitted in the signalling portion of the time-divided channel and is designated the signalling channel. When the called node receives the signal, it transmits an acknowledgment signal in the signalling portion. The calling node then signals a specified timeslot in which digitized voice or data is to follow.



  Either node may direct the other node to switch to another timeslot or channel for communication. This may be done, for instance, where one channel is extremely busy. Preferably, for two-way voice communication, the first node would transmit in the specified timeslot in every other frame, with the second node transmitting in the frames in between.  



   Data and digitized voice are both sent in the same manner, thus simplifying the circuitry required.



  The signalling channel employs a slotted ALOHA type collision detection system, with each node monitoring on the receiving line to determine if the signal transmitted is received in the same form. If a collision is detected, the node waits for a random amount of time and attempts to transmit again. Collisions within voice timeslots employ an ALOHA collision technique whereby a test signal is inserted into a supposedly vacant timeslot and the received signal is compared with the original.



  If the test signal is returned undamaged, the timeslot is considered seized. If an error is detected, the node waits, seizes another timeslot and the process continues again. Before transmitting, the node must determine that the timeslot is available for a series of frames. Once a node has acquired a timeslot by transmitting in it, it will retain that timeslot for the duration of the communication. Other nodes will detect data being transmitted in that timeslot, and will not attempt to acquire that timeslot.



  Establishing Voice Telephone Link
 Another aspect of the present invention is the unique method of claiming a voice times lot by individual telephone stations in distributed intelligence network.



  One station generates a periodic timing mark, and the remaining stations monitor the timing mark and also monitor which times lots following the timing mark are busy with transmissions. An individual station placing a call   dynamicly    chooses a free times lot and begins transmission. In the event of a collision, another timeslot acquisition is attempted. Thus, there is no need for a central assignment of timeslots.



   In particular, certain timeslots are set aside for control data, and others for voice data. A voice  timeslot is first claimed, and then a signalling packet is sent in a control data timeslot. The signalling packet has destination address, and also contains data on the originator's address and the position of the claimed timeslot. The signalling packet is sent over a plurality of channels, and also specifies the correct channel (i.e., frequency channel) of the originator. The originator's channel is then monitored for a response.



  The receiving station will attempt to claim another timeslot having a predetermined relationship to the already claimed timeslot, for a response. Upon such a successful claiming an appropriate signalling packet is sent to the originating station, and voice communication can then commence by the placement of voice data in the appropriate times lots.



  Session   Laver   
 The present invention provides a series of techniques for establishing, maintaining, and terminating voice communications between nodes in a network, and provides techniques for controlling communications when a user invokes features on a telephone.



   In a preferred embodiment, the invention is implemented in a system that uses time domain multiplexing. A timing mark generator ("TMG") broadcasts periodic timing marks that define a series of cycles.



  Each cycle includes at least one interval that defines a signalling packet ("SP") interval while remaining portions of the cycle define a number of voice timeslots ("VTS"). The cycle rate and VTS width are such that one direction of a voice communication can be supported on a single VTS. Designated pairs of   VTS's    in a cycle define a voice circuit ("VC") capable of providing full duplex communication. Each node is interfaced to a common broadband medium, and may provide trunk interfaces or telephone interfaces. A typical telephone call entails  an exchange of SP's between the nodes and a claiming process wherein vacant VTS's are claimed for the duration of the communication.



   When a user takes a telephone off-hook and dials an extension, the node associated with that phone (first node) claims a first VTS of an apparently unused
VC. The claiming entails having the node transmit a
Claiming Voice Packet ("CVP") onto the VTS, and verifying that the node's own CVP comes back intact. Upon successfully claiming the first VTS, the first node transmits a Call Request SP addressed to the second node.



  The second node, upon receiving the Call Request SP, sends an ACCEPT SP, which the first node acknowledges with an ACK SP. When the designated phone at   the-second    node goes off-hook, the second node claims the second VTS of the VC, thereby completing the voice circuit. Upon successfully claiming the second VTS, the second node sends an ANSWER SP to the first node, which the first node acknowledges with an ACK SP. Thereafter, each node transmits voice data in its claimed VTS and receives voice data from the VTS claimed by the other node. When either party goes on-hook, a disconnect SP is sent by the terminating station and the connection is terminated.

 

   The invention contemplates an exchange of SP's to invoke various features. For example, a hold feature wherein an ongoing conversation may be suspended by the first node is invoked by having the first node send a
HOLD SP to the second node while ceasing to receive, and when the second node acknowledges with an ACK SP, it stops transmitting into its claimed VTS. The first node may periodically transmit CONTINUE HOLDING SP's and the second node will respond with CONTINUE-TO-HOLD SP's.



  When the first node wishes to reestablish communication, it claims a new VTS, and sends an UNHOLD SP. The second node claims the remaining VTS of the VC and returns an
ACK SP. The first node then transmits and receives and  
VP's are exchanged.



     Time-Frecruencv MultiDlexinq   
 Another aspect of the present invention is the unique method and apparatus for implementing timedivision multiplexing. A plurality of different frequency channels are used, preferably four. Each channel has an upstream and a downstream frequency band.



  Transmissions from any node occur on a particular channel in a timeslot in that channel and are routed on the upstream frequency band to a head-end return unit, which translates the signals into the downstream frequency band of the channel, and transmits them on the downstream frequency band. A timing mark generator is coupled to the system so that it can simultaneously generate timing marks on all four channels, thus synchronizing the various frequency bands. Each channel circuit in the head-end unit has its own clock, which is phase locked to a master clock to synchronize all 4 channels. In addition, the head-end unit contains a fast digital phase lock loop to allow a quick phase lock on the first few bits of a data packet sent by a transmitting node.

  Each channel of the head-end return unit is phase locked to the same clock as the other channels, providing an additional element of synchronization. This combination of different synchronizing elements allows a practical time and frequency multiplexed system to operate.



   Synchronization is maintained between timing marks through the use of a pseudo-silence pattern (alternating l's and 0's) which is inserted at the headend unit. This will allow a phase lock to be maintained at the individual nodes in-between timing marks by providing alternating data. The system thus allows each transmitting node to include only a single modem which can shift its frequency from one channel to another and still maintain synchronization. The only elements which  need access to all channels simultaneously are the headend return unit and the timing mark generator.



  Maximum Likelihood Detector   (MID)   
 The digital phase lock loop is also referred to as a maximum likelihood detector (MLD). This device is necessary to quickly phase lock upon a data packet. A   "pad"    time where no transmissions occur is added by convention at the beginning of each packet to allow the
MLD to reset. The MLD accepts the data after it has been demodulated and converted back into digital form. The data is provided into a shift register at a clock rate much higher than the data rate. A bit synchronizer then compares the various shifted outputs to determine which has an edge closest to the HRU clock. Once that determination is made, that shift register output is used for the remainder of the data packet, without further readjustment.



   A further understanding of the nature and advantages of the present invention can be realized by reference to the remaining portions of this specification and the attached drawings.



   BRIEF DESCRIPTION OF THE DRAWINGS
 Fig. A-l is a block diagram illustrating a typical physical organization of a communication network according to the present invention;
 Fig. A-2 is a schematic diagram of portions of the network;
 Fig. A-3 is a diagram showing the time structure of signals on the network;
 Fig. A-4 is a schematic block diagram of a voice interface unit;
 Fig. A-5 is a schematic block diagram of a  network boot unit;
 Fig. A-6 is a flowchart of the boot ROM code; and
 Figs. A-7A and A-7B are flowcharts of the NBU code;
 Fig. B-l is a schematic block diagram of the
RxTx circuit shown in Fig. A-4;
 Fig. B-2 is a schematic block diagram of the
PCTL circuit shown in Fig. A-4;
 Fig. B-3 is a diagram showing the general time structure for P-RAM access;
 Fig.

  B-4 is a diagram showing signal input and output lines for the RxTx circuit, the PCTL circuit, and the P-RAM shown in Fig. A-4;
 Fig. B-5 is a diagram showing time slot marker pulses;
 Fig. B-6 is a diagram showing a delimiter search window;
 Fig. B-7 is a diagram showing the relationship between transmit and receive frame timing;
 Fig. B-8 is a diagram showing time slot pad times;
 Fig. C-l is a schematic diagram illustrating the transmission time differences to the head-end retransmission unit;
 Fig. C-2 is a block diagram of the circuitry for a connection at a node of the system of Fig. Al;
 Fig. C-3 is a diagram of the different frequency channels utilized in a communication system according to the present invention;
 Fig. D-l is a flow chart showing the claiming of a voice timeslot by an originating node;
 Fig.

  D-2 is a flow chart showing the claiming of a reverse timeslot by a called node;
 Fig. E-l to E-13 illustrate protocols for establishing and maintaining extension and trunk calls;  
 Figs.   E-14    to E-35 illustrate protocols for implementing features invoked by the user;
 Figs. E-36 to E-38 illustrate protocols for terminating calls;
 Fig. F-l is a block diagram of the HRU and its connection to the trunk interface units;
 Fig. F-2 is a block diagram of the phase lock synchronization of the four HRU channels;
 Fig. F-3 is a block diagram of a maximum likelihood detector (MLD);
 Figs. F-4 and F-5 are block diagrams of one channel of the HRU; and
 Fig. F-6 is a block diagram of the interface between the HRU and the trunk cards.



   BRIEF DESCRIPTION OF THE TABLES
 Table A-l is a list of abbreviations used in the application;
 Table A-2 sets forth the packet formats;
 Table A-3 is a map of the packet RAM ("PRAM");
 Table A-4 sets forth the boot image format;
 Table A-5 sets forth the boot request signalling packet ("BRSP") format; and
 Table A-6 sets forth the boot control signalling packet ("BCSP") format.



   BRIEF DESCRIPTION OF THE APPENDICES
 Appendix 1 is a specification for the transport layer software, setting forth the different transaction types supported.



   Appendix 2 is a specification of the software in the DRAM for controlling the communications.



   Appendix 3 is a specification of the firmware for   "Spike."   
 Appendix 4 is a detailed specification of  procedures for registration and de-registration of Voice and Trunk Interface Units.



   DESCRIPTION OF THE PREFERRED EMBODIMENT
Network Overview
 Table   A-l    provides a list of abbreviations used in the application.



   Fig.   A-l    is a block diagram illustrating a communication network 10 based on a bus medium 12. Bus medium 12 typically has the physical topology of a tree structure with a number of branches 12' to which various network nodes are coupled. The primary function of the network as described herein is to support voice communication among users on the network and between such users and the public switched network. However, network 10 may also be used for data and video as well. The network contains no central intelligence for allocating bus resource. Rather, each node has its own intelligence providing it the capability of vying for and claiming bus resource as needed.

 

   The network nodes include a plurality of voice interface units   ("VIU's")    20, each shown with one associated telephone 22, a trunk interface unit ("TIU") 25 having a plurality of trunk lines 27 for coupling to the public switched network, an attendant interface unit/console ("AIU") 35, one or more network boot units ("NBU's") 40, each with its associated non-volatile storage such as a hard disk 42, and one or more timing mark generators ("TMG's") 45. Bus medium 12 is coupled to a head end retransmission unit ("HRU") 50. An I/O processor   ("lOP")    51 couples TIU 25 to HRU 50. A network manager workstation ("NMWS") 52 with an associated hard disk 53 is coupled to the NBU and its disk.

  A VIU may be single-port device with one phone as shown, or may be a multiple-port device (up to 24 ports) with each port capable of supporting a phone.  



   In a present implementation, NBU's 40 and HRU are physically located within the same cabinet as TIU, and timing mark generator 45 is incorporated into NBU 40.



  Thus there are no separate enclosures for TMG 45, NBU 40, or HRU 50.



   Each node has associated address information.



  This includes a 6-byte physical unit address   ('tPUA")    which is a hardware embedded serial number unique to that node with respect to any other node in any network made by the same manufacturer. Uniqueness with respect to nodes made by different manufacturers can be guaranteed by agreement between the manufacturers or the establishment of a central PUA issuing authority.



   Nodes can also be assigned a 2-byte local unique address ("LUA") by the network manager. The LUA is unique with respect to other nodes at a given customer site. It is possible to address all nodes at the same time with a broadcast LUA having a hexadecimal value
FFFF.



   Nodes can also be assigned a 2-byte system link extension ("SLE"). The same SLE may be assigned to multiple nodes, thereby permitting group   addressing   
Conversely, a node supporting multiple phones may have more than one SLE.



   Address comparison is performed as follows.



  Each node contains a 64-bit hash table for each of PUA,
LUA, and SLE address comparison. Since there are more than 64 possible addresses, the hash table mechanism does not provide a unique selection, but rather a first-level filtering only. Additional address selection is carried out by higher level software. For the PUA and LUA hash tables, and for the SLE hash table where the node has a single SLE, one bit is set, that bit being in the position corresponding to the numerical value of the last 6 bits of the cyclic redundancy check of the node's PUA,
LUA, or SLE, as the case may be. For a node with more  than one SLE, the SLE hash table has bits set for the multiple SLE's, the positions being determined as described above. Due to the lack of uniqueness, the number of bits set may be less than the number of SLE's.



   Associated with each phone is a 2-byte configuration identifier   ("CID"),    which is stored in RAM and identifies the configuration (feature set, extension) for that phone. CID's are created by the system administrator at the NMWS. A unit's phone extension number can be used as the CID but this does not necessarily need to be true. Since each phone needs a configuration, multiple-phone VIU's will have multiple
CID's. A special CID (value 0) is used to identify a configuration that if loaded into a unit, limits the unit's operation to acquiring manually entered CID's.



   Bus medium 12 is preferably a broadband coaxial cable capable of supporting a number of frequency channels, each defined by a carrier frequency on which signals can be superimposed. Each user device can broadcast its transmissions on the cable toward HRU 50.



  HRU 50 operates to receive signals on a first set of channels and retransmit them on a second set. Thus, twoway communications may be implemented on a single cable by frequency division multiplexing the available RF cable spectrum. The channels are preferably 6 MHz wide, with the transmitting channels in the range from 5-108 MHz and the receiving channels in the range of 175-400 MHz. In the preferred embodiment, there are four channels, each with an associated transmit frequency and receive frequency band, and each node is capable of operating on any of the channels. Each node is assigned a home channel on which it normally listens when not participating in a communication. Boot transmissions typically occur on a designated boot channel.



   HRU 50 transmits a pseudo-silence pattern (PSP) (e.g. alternating l's and 0's) when there is no incoming  data. This allows the VIU's in the network to always have an incoming data stream, which adds to the stability of the PLL's in all of the VIU modems and provides a less expensive and more efficient receiver and bit sync circuit. Additionally, the PSP acts as a   "not"    carrier detect, and the VIU's may consider the given channel as free when the PSP is received.



   HRU 50 implements a data reclocking scheme to provide a constant phase data signal to the nodes. Since the upstream transmission is supplied by an unknown source with regard to phase (since the relative phase of the incoming packets varies with the physical position of the originating node), HRU 50 uses a Maximum Likelihood
Detector (MLD) to reclock the downstream transmission.



  The MLD detects the rising edges in the first four bits of packet preamble, and then delays the data path by a time of   0    to 1 bits (in increments of 0.062 bits) to properly align the center of the data bits and the edge of the sampling clock. With this method, no frequency lock is required since the downstream transmissions of
HRU 50 are the system's source of master clock.



   The described functions can be implemented with a high speed digital phase-locked loop that responds to the received packet's needs within a four-bit time span during the packet preamble. The selected delay will remain locked until a loss of carrier is detected at the headend which will be interpreted as an "End of Packet".



  HRU 50 will then begin transmitting pseudosilence and reset the MLD for the next packet.



   Thus, while network 10 is physically and topologically organized as a tree, it is logically organized as a bus. The bus is logically a dual linear bus having transmit and receive channels 55 and 57 as shown schematically in Fig. A-2. While only two VIU's and two NBU's are shown, an actual system might have a hundred or more VIU's. The representation of Fig. A-2 is  schematic only, since there are not actually two physical buses, but rather a single broadband communications medium capable of supporting a number of communication channels.



  Network Timing
 Fig. A-3 is a diagram showing the time structure of signals on the network. TMG 45 provides a series of timing mark packets ("TM's"), transmitted simultaneously on all four channels, at 1-ms intervals, thereby defining a series of l-ms frames. The TM's also indicate whether they are on a boot channel, and provide the channel number.



   The frames are logically grouped into pairs, each containing first and second frames, designated the forward frame and the reverse frame, with each pair defining a 2-ms cycle. Each frame consists of a 10-byte timing mark, a 71-byte (60 data bytes) signalling packet ("SP"), and 28 19.5-byte (16 data bytes) voice timeslots ("VTS's"), each capable of containing a voice packet ("VP"). Each packet interval consists of a preamble of alternating l's and 0's, a delimiter, a data field, and a pad. The delimiter is a binary code specifying whether the packet is a TM, a VP, an SP, a claiming voice packet ("CVP"), or a boot packet ("BP"), and is distinguishable from the preamble in that any 3-bit string has at least two bits in a row the same. Table A-2 provides a list of the various packet formats.

 

   VP's are used to provide voice communication and contain binary encoded (pulse code modulation  "PCM") speech from a specific phone conversation. They are transmitted every cycle during the course of the conversation. An ongoing telephone conversation entails having VP's for one direction of the communication carried on a VTS of the forward frame and for the other direction of the communication on the corresponding VTS for the reverse frame. VP's contain no computer  recognizable information. They are merely reconstructed into voice at the receiving node. A special voice packet, the CVP, is used to reserve a VP timeslot for data transmission/reception.



   SP's are used for communications between nodes and contain computer recognizable information pertinent to the control of the network. While specific types of
SP's will be discussed below, it is noted that an SP contains a data portion which includes a link header and a transport header as well as information specific to the type of SP. The link header contains source and destination address information, specifically: 2 bytes of destination address information (enough for an LUA or an
SLE); an address control byte containing two 2-bit codes specifying the destination and source address types (PUA,
LUA, or SLE); a length byte; 4 bytes for the rest of the
PUA if the destination address is a PUA; and 2 or 6 bytes of source address information.



   BP's are used in boot operations to communicate configuration data and operating code from an NBU to other nodes. BP's are broadcast in the VTS's normally occupied by VP's.



   Each node is characterized by a skew time related to its physical position on the bus. Skew time refers to the differential propagation delays resulting from the fact that the different nodes are at different distances from HRU 50. The nodes most remote from the
HRU will receive the timing marks latest in time, and would, if they merely synchronized their transmissions to the timing mark, transmit relatively late compared to nodes nearer the HRU. Accordingly, the further a node is from HRU 50, the earlier it must transmit relative to the timing marks to be in synchronization. A procedure whereupon each node determines its own skew time is described later in this application. In essence, each node, on power-up, transmits an SP immediately upon  receiving a timing mark, and counts the number of bit times (1/(5.018 MHz)) until it receives the same SP (as retransmitted by the HRU).

  This defines twice that node's skew time, and subsequent transmissions will be advanced by the skew time.



   In the event that there are more than one TMG in the network, the TMG's arbitrate amongst themselves at power up to determine which is to become the master TMG.



  Each TMG waits a random length of time (up to about 50 ms), and then broadcasts TM's on all channels. If a TMG receives TM's that it sent, it assumes the status of master TMG. The other TMG's assume the status of backup
TMG's and monitor the four channels to ensure that the master TMG is sending valid TM's. In the event that TM's on any channel stop for some number of consecutive frames, the backup TMG's arbitrate to become the new master TMG. The arbitration process is similar to that described above.



  Basic Node Organization
 The hardware for a given node in the network includes certain portions that are essentially common to all nodes and certain portions that are different for the different types of nodes. The description in this section will be in terms of one of VIU's 20 and one of
NBU's 40.



   Fig. A-4 is a block diagram illustrating one of
VIU's 20, the function of which is to interface one or more phones to the network. VIU 20, like other nodes, must be able to communicate on any channel. Access to multiple channels (only one at a time) is provided by a frequency agile modem 70. VIU 20 further includes a CPU 72 and associated memories, a codec 75 and telephone interface 77, and a control/interface circuit 80.



   Other types of nodes in,the network share the same basic hardware organization in the sense of having  the same control/interface circuit elements, CPU and associated memories, and modem However, other types of nodes would not include codec 75 or telephone interface logic 77, and would have different operating software and configuration data stored in their associated memories.



  Some types of nodes (such as an NBU or a multi-port VIU) must be able to communicate on all channels at the same time, and are provided with a separate control/interface circuit and modem for each channel. Because each node uses the same basic set of network elements for all configurations, the network is modular and incrementally expandable for both small and large telephone systems.



   The memories associated with CPU 72 (preferably an 80186 microprocessor) include a packet RAM ("PRAM") 82, a DRAM 85, and a boot ROM 87. Control/interface circuit 80 contains a receiver/transmitter   ("RxTx)    90, a packet controller ("PCTL") 92, a 3-port memory controller 93, and a PCM highway 95. PCM highway 95 is a   1.544-MHz,    serial, full duplex highway which provides 24 8-KHz 8-bit timeslots (much like a   T1    carrier). Also included in control interface circuit is a timing mark state machine 97 (shown in phantom since it isn't used in the VIU). In a preferred embodiment, control/interface circuit 80 is implemented in a 2-chip set, one chip containing RxTx 90 and timing mark state machine 97, and the other containing PCTL 92, 3-port memory controller 93, and PCM highway 95.



   Table A-3 provides a memory map of PRAM 82.



  The PRAM contains, among other things, transmit and receive ring buffers for the PCM highway   timesiots,    tables specifying which network   VTS's    are free and which are busy, and boot buffers 100a and 100b. Three-port controller 93 allows PRAM 82 to be accessed by RxTx 90,
PCTL 92, and CPU 72. The 3-port controller is responsible for arbitration and control of all PRAM accesses, including accesses to buffers in PRAM 82 that  hold incoming and outgoing packets.



   RxTx 90 provides   a" 5.018-MHz    serial interface to modem 70. It is at this interface that VP's and SP's are communicated. A phase-locked loop in modem 70 recovers the system clock information (5.018   NHz    in two phases) and provides it to RxTx 90. The RxTx generates transmit and receive frame boundaries and the timeslot boundaries within each of the frames. In most cases it uses its received frame as the time base and starts its transmit frame a skew time before. RxTx 90 is also responsible for skew calculation, preamble insertion and removal, and delimiter insertion, removal, and recognition. RxTx 90 also interfaces to CPU 72.



   PCTL 92 operates under control of RxTx 90 and is responsible for voice and tone buffering and routing between network 10 and PCM highway 95. PCTL 92 also supports tone generation (dial tone, ring back, DTMF).



  To send tones towards the handset, digitized samples of the tones are read from PRAM 82 and sent out on the codec bus. It also supports the transmission of tones to the network where DTMF tones may have to be sent.

 

   A key function of control/interface circuit 80 is to route VP's, and to that end must keep track of the active VTS's on the network and map each of these active
VTS's to one of the 24 voice ring buffers in PRAM 82.



  The ring buffers are then mapped one-to-one to the 24 PCM bus timeslots in order to establish a connection between the network VTS and the codec. For receiving data RxTx 90 removes the preamble and delimiter, performs a serial to parallel conversion, and passes the data to PCTL 92.



  The PCTL stores the data in the ring buffer and sends bytes to the codec as required. The ring buffers contain only the actual voice samples for VP's or boot data for
BP's. For transmission, the PCTL receives PCM data samples from the codec, and stores them in the PRAM ring buffer. The PCTL thereafter provides the appropriate  address information to RXTX 90, which appends a preamble and delimiter, performs a parallel to serial conversion, and transmits the data onto the network.



   Fig. A-5 is a block diagram illustrating one of
NBU's 40, the function of which is to download boot images (configuration data and operating software) to other nodes, referred to as boot consumers. As mentioned above, NBU 40 shares many common circuit elements with
VIU 20 (and other nodes in the network). In particular, the NBU contains those elements described in connection with Fig. A-4 except codec 75 and telephone interface logic 77. While the NBU does not support telephones, it includes and uses the PCM highway to support conference calls. Those elements that do correspond are shown with the same reference numerals. Since, in the current implementation, timing mark generation is actually carried out by the NBU hardware, the NBU has four control/interface circuits and modems so as to be able to transmit TM's on all four channels simultaneously.



   The NBU's CPU 72 interfaces with the NBU's associated hard disk 42 through a small computer system interface (SCSI bus interface) 105. The boot images are developed in an off-line development system and written onto floppy disks, which are loaded into NMWS 52 and stored on the NMWS hard disk. The boot images are then transferred to the NBU hard disk(s) independently of the network. Each NBU will typically have boot images for all of the nodes in the network.



  General Software Organization
 The software in a given node is organized in a layered structure based on the International Standards
Organization ("ISO") Open System Interconnection
Reference Model   ("OSI").    The OSI model contemplates an organization having some or all of the following layers:
 Physical;  
 Link;
 Network;
 Transport;
 Session;
 Presentation; and
 Application.



  As will be described below, some of the layers are implemented using both hardware and software. Moreover, certain of the protocols have attributes that do not allow them to be classified in any single layer. Each of the layers will be discussed briefly, while more expanded description will be reserved for those layers pertinent to the present invention.



   The physical layer is concerned with the interaction between the nodes and the network communications medium. Thus, the physical layer encompasses the modem and cable.



   The link layer supports communications between nodes on the network, and is implemented using both hardware (most notably control/interface circuit 80) and software. Some of the basic functions have been described above, some others will be described below in connection with the discussion of the operation of the network.



   The link layer functions are as follows: monitoring TM reception for all nodes and supporting TM generation on certain devices; best effort delivery of
SP's; selective filtering and verification of incoming
SP's (using the hash tables); supporting boot buffer transfers; establishing, monitoring, and disconnecting voice circuits; transferring voice (with padding) from network to the codec; and transferring voice from the codec to the network; generating tone to the codec (with padding) and/or to the network; generating silence to the codec; performing diagnostics and reporting severe errors; and presenting statistics and minor errors  gathered by the hardware.



   The network layer provide a (channel) bridge for establishing communication between channels on the same cable, and between different cables, and will not be discussed further.



   The transport layer is responsible for the reliable end-to-end delivery of data between host entities. This includes providing both best-effort and reliable datagram transfer services, built upon the service exported by the link layer. In a "pure" datagram delivery, transport makes a best effort to deliver an information (or a response) packet to the destination(s), but will not notify the requesting session entity if the delivery is not successful. A "reliable" datagram delivery entails delivery of a user information packet to the destination(s), with notification to the requesting session entity if transport is unable to deliver the packet. Transport also supports large data deliveries wherein a large data transfer request from a user entity is delivered to the destination(s) using a combination of both pure and reliable datagrams.

  If transport is unable to deliver the entire data without error, it will notify the requesting session entity. Appendix 1 is a specification for the transport layer software, setting forth the different transaction types supported.



   The OSI model describes the session layer as the level that provides services required to establish and maintain connections between users across the network. It provides the following services: call establishment and disconnection functions between stations connected to a local area network; initiation and monitoring the voice communication path between the station set users; call establishment and disconnection functions for establishing voice communication between station users and the public switched network users; and implementing various end user features.  



   Depending on the type of node on which it is executed, the session layer has to provide different types of services to the higher layers. While it is possible to provide a common base code to some extent, the differences between such units as VIU's and NBU's make it difficult or impossible to use the same session software on these different types of nodes. However, all the nodes utilize the same set of services and interfaces provided by the lower layers.



   The presentation layer is in general concerned with the user interface. With respect to the network software running in the VIU's, the presentation layer is concerned with the duration and format of all the tones a user may hear from the handset, as well as controlling keyboard interaction and the format of messages displayed on liquid crystal displays for those phone models so equipped. A substantial part of these functions is actually implemented in hardware.

 

   In the TIU, the presentation layer is limited to tone generation and detection. On the NBU, the presentation layer functions are really incorporated in the NMWS.



   The application layer is in general concerned with the user application. In the current embodiment, the only application level software implemented is the
Network Manager. The Network Manager performs the following functions: node configuration, downloading of configuration and code images to the network; monitoring, display and storage of network events; network diagnostics; automatic route selection table generation; and remote network diagnostics.



   The software for certain nodes (e.g., an AIU interface to a microcomputerized console or a VIU interfaced to a microcomputerized feature phone named "Spike") contains additional code to control the communications across the interface. Appendix 2 is a  specification of the software in the DRAM for controlling the communications. Appendix 3 is a specification of the firmware for "Spike."
Call Setup, Maintenance, and Breakdown
 Consider now a typical phone call from one VIU to another. A station set is taken offhook and a local extension number is dialed. Since there is no central intelligence assigning VTS's to the various nodes, the originating device must first capture one.

  The control/interface circuit keeps track of the status of all the VTS's (busy or free) and attempts to claim the forward half of a free VTS by transmitting a unique
Claiming VP on that VTS and checking that it comes back intact This assures that a VTS thought to be free is indeed free. All other nodes in the network see the
Claiming VP on the VTS being claimed and change their
PRAM-resident busy/free tables to specify that VTS as occupied.



   Once the VTS is claimed, silence VP's are transmitted to maintain the circuit, and a Call Request
SP is broadcast across the network. This SP is sent on all channels, and specifies the originator's home channel and the VTS that was claimed. This SP also contains information specifying the source LUA of the call originator and the desired group address (SLE) of the destination (since an extension number can appear at many stations, it is considered to be a group address type).



   All other stations on the network receive the
Call Request SP and compare the contents of the destination field within the packet to the extension numbers which are supported by the receiving station.



  The Call Request is ignored if no match exists. If the destination extension matches one of the extensions supported by the receiving station, and the destination is not busy, the destination sets itself to operate on  the originator's home channel, after which an Accept SP is sent back to the originator with the receiving station's LUA.



   Since the LUA of the accepting station is included in the Accept SP, the originating station will know the specific station which has accepted the call.



  Therefore, an Accept Acknowledgement SP is sent directly to the accepting station using LUA addressing to begin ringing at the destination station, and a ringback tone is sent to the originator's handset. When the destination station goes offhook, the reverse timeslot is claimed, indicating an answer. If the claiming is successful, an Answer SP is returned to the originating station. Silence VP's are now replaced with actual VP's.



  After the conversation is over and either party goes onhook, a Disconnect SP is sent by the terminating station and the connection is terminated. If the destination is busy, a Busy SP is returned to the originator and the exchange ends with the originator receiving a busy tone.



  Network Boot Unit and Protocols
 Nodes require the downloading of boot images when they are powered up, which occurs after a power failure, when they are first brought on line, or when they are disconnected and moved. Boot images are also downloaded when a new software release is to be installed on some or all of the nodes. Downloading typically occurs in two stages, first program code, and then configuration data. The program code is generally much longer than the data, and can be downloaded to a number of nodes at the same time. The configuration data is different for each node, and must be downloaded on an individual basis. As will be described below, a node, having received its code image requires its CID before it can request its configuration.  



   Table A-4 provides the format of a boot image file. Boot images are divided into blocks, with the size of each block depending on the size of boot buffers 100a and 100b in PRAM 82 (256 bytes each in the present implementation). As can be seen, the file contains an initial block having global information as to the boot image file, and a number of data blocks, each having the actual data and associated header information about the specific block (load address, block size, block number).



   BP's, which occupy VTS's, are used to transmit boot images over the network. Each BP contains 16 bytes of data, which translates to a data rate of 64 kilobits/sec if only one VTS per cycle is used. In view of the possible large size of boot images, BP transmission and reception may occur on multiple VTS's, thereby providing higher data rates.



   Boot transmissions occur in response to requests from boot consumers. Such requests are typically made when a node is powered up, either at the same time as the rest of the network, or after being connected to the network while the rest of the network has been running. A node requiring a boot image transmits a boot request SP ("BRSP") to request the image it needs. The NBU responds by sending boot control SP's   ("BRSP")    and BP's, as will be discussed in detail below.



   Table A-5 sets forth the format for a BRSP.



  BRSP's are sent to an address permanently assigned to
NBU's and contain image descriptor information specifying the memory image being requested.



   Table A-6 sets forth the format of a BCSP.



  BCSP's are sent on all channels and contain boot control and image descriptor information. Boot control specifies which channel, frame, and VTS('s) are used to transmit the image. The image descriptor provides information about the memory image itself. This information is statically bound to each boot image and resides with the  boot image on hard disk 42. It is generated in the development environment and included as the header of the boot image file. It is extracted by the NBU to create the BCSP.



   On power up, the boot consumer executes the code stored in its boot ROM. Fig. A-6 is a flowchart of the boot ROM code. The node scans the various receiver frequencies to find a channel with timing marks. After identifying its unit type and boot channel, the node begins to receive and interpret SP's, waits for BCSP's identifying the necessary image, and transmits a BRSP if it does not receive the required BCSP within a certain random time interval (up to 50 ms). It performs its part of the boot operation according to the parameters specified in the BCSP.



   Figs. A-7A and A-7B are   flowcharts    of the NBU code. Before transmitting the boot image, the NBU claims one or more VTS' (in the same manner as the VIU claims a
VTS in a voice call), and transmits (on all channels) boot control SP's ("BCSP's") containing boot control information and image descriptor information about the boot image being broadcast.

 

   Multiple NBU's having the requested boot image arbitrate amongst themselves to decide which one is to respond to a BRSP. Upon receiving a BRSP, each NBU attempts to claim the service by adding the boot group address of the requested image and sending a BCSP with no
VTS's allocated. If it receives its own BCSP (as determined by the source address) first, it will start the boot process by claiming one or more VTS's and sending a BCSP to the boot consumers. The downloaded image will satisfy multiple requests for the same image.



   BCSP's are sent a predetermined amount of time before the actual transmission of the specified block so as to allow the boot consumers time to receive the image.



  They are also sent throughout the image transmission to  allow other boot consumers to start receiving the image in the middle of the transmission, with a second transmission being used to fill in the missing parts.



  BCSP's are sent to group addresses, there being a group address assigned to each type of network unit. Boot ROM 87 in each unit, based on its unit type, can receive and filter for the corresponding BCSP.



   There is also a procedure for downloading boot images to nodes that are not specifically requesting.



  This is initiated at NMWS 52, which causes the NBU to send an SP instructing nodes to take themselves out of service and then to come back up. On coming up, the nodes request the boot images as discussed above.



   Boot packets are sent from and received into boot buffers 100a and 100b in PRAM 82. The control/interface circuit alternates between the boot buffers when retrieving or storing boot information, varying the delimiter to specify which buffer is to be used. There are two registers which control each direction of boot activity, the Tx and Rx boot buffer and boot pointer registers (referred to collectively as the boot registers). In actual practice, units will never both transmit and receive boot information, but this facility is provided for diagnostic purposes. The boot registers are typically zeroed by software before starting boot transmission or reception. PCTL 92 controls (writes to) these registers during the boot process, so software should not write to the boot registers while the boot operation is in progress.



   The Tx boot buffer register specifies the boot buffer (0 or 1) from which the next BP is to be fetched.



  The Tx boot pointer register points to the location in that boot buffer of the next BP. The Tx boot buffer register is toggled immediately after the last byte in a given buffer is read by PCTL 92. The Rx boot buffer register points to the boot buffer (0 or 1) to which the  next received BP is expected to be delivered. The buffer into which it is actually placed depends on the BP delimiter. The Rx boot buffer byte toggles after a BP is received which fills the current buffer, or immediately upon reception of a BP destined for the other boot buffer. The Rx boot pointer register always points to the next byte in the current boot buffer into which a BP is to be written.



   As mentioned above, a node normally receives its code image first, followed by its configuration data.



  Before a node can request its configuration data it must have its CID. If the node has just been powered up, it doesn't have its CID. If the node is a TIU, it calculates the CID for each port based on its cabinet, slot, and port numbers. If the node is a VIU, it requests its CID from the NBU by sending a CID Request SP (with CID = 0). A single-port VIU (needing only one CID) identifies itself by its PUA. A multiple-port VIU makes separate CID requests for each of its ports, identifying itself on each request by its cabinet and slot numbers as well as the port number. When all VIU's come up at once, they could flood the network with CID and configuration image requests. To alleviate network congestion, each device waits an amount of time based on its PUA before sending its CID request.

  If the requesting VIU has previously been installed on the system, the NBU has its
CID in a table, and responds with a CID Response SP. The
CID Response SP specifies the CID and a backoff time for the VIU to wait before sending its BRSP requesting configuration data. If the requesting VIU has come up for the first time, the NBU does not have its CID, and sends a CID Response SP (with CID = 0).



   The VIU then uses this zero value CID to get a special configuration that only allows CID entry from the phone; no phone calls are possible with this configuration. A user picking up the handset hears an   "Enter CID" tone instead of a dial tone. The user must then invoke the feature code to enter a CID, and hears no tone until the CID is verified. The VIU software receives the CID, and sends a CID Request SP (with the non-zero CID) to register the CID with the NBU.



   If the CID is unique on the network, the NBU responds with a CID Response SP that contains the CID.



  The VIU gives a "CID Confirmed" tone to the user. The
VIU then requests the configuration image from the NBU.



  Once the configuration image has been received, the user gets a dial tone. If the CID is already registered by another device or is a reserved CID, the NBU sends a CID
Response SP (with CID = 0). This causes an error tone if the phone is still offhook. After the user hangs up, the "Enter CID" tone is produced when the phone is later taken offhook.



   Once a single-port node has been registered on the network, that node, together with its phone, may be relocated to a different area and reconnected to the network. The attached phone will then automatically assume the same extension number and pre-configured features as at the previous location. The same is true if a multi-port VIU and all the attached phones are relocated, and also for any other kind of network node, regardless of whether they support phones, trunks or
NBU's.



   The network also supports de-registration and re-registration of nodes according to pre-configured criteria. Appendix 4 is a detailed specification of procedures for registration and de-registration of Voice and Trunk Interface Units. Varying modes of registration and re-registration are permitted. Thus, global registration and re-registration permits new phones to be added and existing phones to be re-registered at will, while the most secure mode permits nothing to be registered or re-registered.  



  RXTX/PCTL/PRAM Organization and Operation
 Fig. B-1 is a more detailed diagram of RXTX 90.



  As shown therein, RXTX 90 comprises a modem interface 120, a modem receive state machine 124, a modem transmit state machine 128, a CPU interface 132, and a PCTL interface 136. RXTX 90 is synchronized to the network and therefore requests network-related data transfers.



   Modem interface 120 packetizes and depacketizes all information going through control/interface circuit 80. This includes inserting/detecting delimeters and generating/checking CRC's. The low level tasks of determining skew and maintaining the receive and transmit frame timing are also done here.



   CPU interface 132 consists of interupt circuitry, command and status registers, and the microprocessor interface circuitry required to access them. In this embodiment, CPU interface 132 is designed to interface with the intel 80186 bus structure. To minimize the real-time load on CPU 72, CPU 72 is interrupted only when an event in which it is interested occurs.

 

   PCTL interface 136 takes care of any buffering or timing considerations that might be necessary for receiving and transmitting data. PCTL interface 136 also communicates the necessary information with PCTL circuit 92 for accessing P-RAM 82. In this embodiment, PCTL interface 136 is directly coupled to the P-RAM 82 data bus.



   Modem RX state machine 124 and modem transmit state machine 128 control the operations between modem interface 120, CPU interface 132 and PCTL interface 136.



  The operation of modem receive state machine 124 and modem transmit state machine 128 is governed by the timing inputs from modem interface 120 and the commands received from CPU interface 132. Modem receive state  machine 124 and modem transmit state machine 128 interact with each other when a node is monitoring its own transmission (e.g. CVP's).



   Fig. B-2 is a more detailed diagram of PCTL circuit 92. PCTL circuit 92 includes a RXTX interface 142, a network receive state machine 146, a network transmit state machine 150, a P-RAM interface 154, a PCM highway interface 158, a PCM highway state machine 162, and a CPU interface 166.



   RXTX interface 142 is responsible for accepting commands from RXTX 90 and passing them to the appropriate network state machine 146 or 150. RXTX interface 142 also keeps track of the current network transmit and receive times lots via network transmit and receive framing signals from RXTX 90.



   Network receive state machine 146 translates the commands received from RXTX 90 involving network receive operations into the appropriate P-RAM 82 accesses. For example, one of these commands instructs network receive state machine 146 to deliver voice data to the P-RAM resident receive ring buffers from RXTX interface 142. Network receive state machine 146 is responsible for generating the required P-RAM addresses and for controlling the data flow between P-RAM 82, PCTL interface circuit 154, and RXTX interface 142. In addition, it maintains all state information necessary to perform these tasks, such as pointers into the TM, SP,
CVP, and BP receive ring buffers. Network receive state machine 146 uses its own time slot interchange table to read the mapping between the network receive time slots and the receive ring buffers.



   Network transmit state machine 150 translates commands from RXTX interface 142 involving network transmit operations into appropriate P-RAM 82 accesses.



  For example, one of these commands instructs network transmit state machine 150 to deliver voice data from the  
P-RAM resident transmit ring buffers to RXTX interface 142. Network transmit state machine 105 is responsible for generating the required P-RAM addresses and controlling the data flow between P-RAM 82, PCTL interface 154, and RXTX interface 142. In addition, it maintains all the state information necessary to perform these tasks, such as pointers into the TM, SP, CVP, and
BP transmit ring buffers. The network transmit state machine 150 interprets the P-RAM resident time slot interchange which maps the network transmit time slots to the appropriate transmit ring buffer (and thus PCM highway timeslot). It then controls the actual data transfers from the P-RAM resident ring buffers to RXTX interface 142.



   PCM highway interface 158 is responsible for keeping the PCM highway state machine 162 in sync with the PCM highway. It also controls transmissions onto the
PCM highway. Data transmitted on the PCM highway should be encoded using mu-255 as per CCITT recommendation
G.711.



   PCM highway state machine 162 is responsible for transferring data between the P-RAM 82 ring buffers and PCM highway interface 158. As discussed below, there is one transmit and one receive ring buffer in P-RAM 82 for each of the 24 PCM highway time slots to buffer voice data between the network and the codecs. PCM highway state machine 162 interprets the mode command register in
P-RAM 82 that selects idle, voice, or tone mode, and then transfers information as required. PCM highway state machine 162 also checks both transmit and receive ring buffers in P-RAM 82 on every access for overflow conditions, and takes appropriate action.



   P-RAM interface 154 controls all accesses to P
RAM 82. It uses a slotted access scheme, reserving every other P-RAM access for PCM highway state machine 162. It reserves the remaining access slots for network transmit  state machine 150 and network receive state machine 146 as shown in Fig. B-3. Each state machine must request each use of its access slots from P-RAM interface 154.



  Any slots not used by their owner are available for use by CPU 72.



   CPU interface 166 services CPU requests to read from or write to command and status registers disposed within CPU interface 132. In addition, it routes requests to read from or write to P-RAM memory space to
P-RAM interface 154. P-RAM interface 154 in turn provides a "ready" signal to CPU 72 when appropriate and transfers data as required. As the CPU operates using an unknown clock phase (and possibly frequency) compared to
RXTX 90 and PCTL 92, all CPU requests are synchronized to the clocks within RXTX 90 and PCTL 92 before being executed.



   Fig. B-4 is a more detailed diagram of the inputs and outputs for RXTX 90, PCTL 92, and P-RAM 82.



  The I/O terminals of modem interface 120 (Fig.   B-l)    in
RXTX 90 (shown at the bottom of RxTx 90 in Fig. B-4), includes an M-5 input terminal 200 for receiving 5.018 megahertz clock pulses (used e.g. for data timing); an
RXD input terminal 204 for receiving serial data (5.018
MBPS) from modem 70; a TXD output terminal 208 for transmitting serial data (5.018 MBPS) to modem 70; an ME output terminal 212 for providing a modem enable signal to modem 70; a RCH bus 216 for providing a 4-bit receive channel number to modem 70; a TCH bus 220 for providing a 4-bit transmit channel number to modem 70; an MF input terminal 224 for receiving a modem fault signal from modem 70; a MFR output terminal 228 for providing a modem fault reset signal to modem 70; an OSCE output terminal 232 for providing an oscillator enable signal;

   and a bidirectional M/SF terminal 236 for synchronizing the transmit frame with other RXTX circuits 90 at the node.



  M/SF terminal 236 is an output terminal when RXTX circuit  is a master timing mark generator, and it is an input terminal when RXTX circuit 92 is a slave timing mark generator. Circuit timing will be discussed in more detail below.



   The I/O terminals of CPU interface 132 (Fig. B1) in RxTx 90 (shown at the top of RxTx 90 in Fig. B-4) include a bidirectional RTCPUD 242 bus for communicating 8-bit parallel status and command data with CPU 72; a
RTCPUA bus 246 for receiving 5-bit addresses from CPU 72; an RTCS input terminal 250 for receiving a chip select signal from CPU 72; an INT output terminal 254 for providing interupt signals to CPU 72; an RDY output terminal 258 for providing "ready" signals to CPU 72; a
BER output terminal 262 for providing bus error signals to CPU 72; an RTCPUR input terminal 266 for receiving CPU read pulses; and an RTCPUW input terminal 270 for receiving CPU write pulses.



   The I/O terminals for PCTL interface 136 (Fig.



  B-1) in RXTX 90, and RXTX interface circuit 142 (Fig. B2) in PCTL 92 include a TXS terminal 274 for communicating transmit frame synch pulses to PCTL 92 for marking transmit time slot boundaries; a TXFR terminal 278 for indicating to PCTL 92 whether the transmit frame is forward or reverse; an RXS terminal 282 for communicating receive frame synch pulses to PCTL 92 for marking receive frame time slot boundaries; an RXFR terminal 286 for indicating to PCTL 92 whether the current receive frame is forward or reverse; an RFL terminal 290 for indicating to PCTL 92 whether the receive frame is locked; a PW terminal 294 for providing signals to enable RXTX 90 to communicate directly with P
RAM 82; a synch terminal 298 for providing signals to synchronize the state machines within PCTL 92 with the state machines within RXTX 90; a 5-bit CMD bus 302 for communicating RXTX 90 commands to PCTL 92; 

   and a bidirectional PD bus 306 which is an 8-bit data bus for  accessing P-RAM 82. PD bus 136 is coupled to one port of 3-port controller 93. When more than one channel is to be accommodated in a device, multiple RXTX and PCTL circuits communicate with each other using the foregoing terminals. In that case, the terminals bay be broadly described as an interchannel bus (ICB).



   The I/O terminals of CPU interface 166 (Fig. B2) in PCTL 92 (shown at the top of PCTL 92 in Fig. B-4) include a bidirectional PCPUD bus 320 which communicates with the lower 8 bits of the 80186 data bus; a PCPUA bus 324 for receiving the address bits required to access
PCTL internal registers and P-RAM 82; a CRS input terminal 328 for receiving signals indicating that CPU 72 is accessing P-RAM 82; a CPS input terminal 332 for receiving signals indicating that CPU 72 is accessing the
PCTL 92 internal registers; a CRD input terminal 336 for receiving the CPU read signal; a CWR input terminal 340 for receiving the CPU write signal; a CRDY output terminal 344 for indicating to CPU 72 that the PCTL 92 internal register or P-RAM 82 access requested by CPU 72 has completed and valid data is available or has been accepted;

   and a PBER output terminal 348 for indicating that the PCTL 92 access requested by CPU 72 has not completed in a timely manner, thus ending the CPU cycle.



  The signals on PBER terminal 348 can be used either to generate a "bus error" or non-maskable interupt to CPU 72.



   The I/O terminals of PCM highway interface 158 (Fig. B-2) of PCTL 92 (shown on the right hand side of
PCTL 92 in Fig. B-4) include an RPCM terminal 360 for transmitting data to codec 75; a TPCM terminal 364 for receiving data from codec 75; a PCLK input terminal 368 for receiving a 6.176 megahertz clock used to control the
PCM highway interface; and a PCLK terminal 372 for establishing the 1.544 megahertz clock used to transmit and receive data on PCM highway 95. The signals on PCLK  terminal 372 are output by PCTL 92 when a "PCM highway master" bit is set in a PCTL mode register discussed below. PCM highway interface 158 further includes a TSO terminal 376 for indicating that the PCTL 92 internal PCM highway time slot counter should be reset to time slot 0 on the next 6.176 megahertz rising clock edge.

  The signals on this line are output by PCTL 92 when a "PCM highway master" bit is set in the PCTL mode register. A
TXEN terminal 380 provides signals to codec 75 indicating it should begin transmitting data on a current time slot; and a TOE terminal 384 provides signals to codec 75 to cause codec 75 to enable its output drivers to PCM highway 95. The signals on TOE terminal 384 typically are required when using codecs which cannot generate the required transmit PCM highway time slot timing using only the signals on TXEN terminal 380. A RXEN terminal 388 provides a signal which informs codec 75 to receive data from the PCM highway in a current time slot. A PTS bus 292 provides the current 5-bit time slot number on the
PCM highway. A 4-bit PST bus 396 provide the current state of the PCM highway state machine. It is primarily used during chip test.



   The I/O terminals for P-RAM interface 154 (Fig.



  B-2) in PCTL 92 include a 16-bit PA bus 402 for addressing P-RAM 82; a PCS terminal 406 for providing a chip select signal to P-RAM 82; a PWE terminal 410 for providing a write enable signal to P-RAM 82; and a POE terminal 414 for providing an output enable signal to P
RAM 82. These terminals are coupled to one port of 3port controller 93.



  Control/interface Circuit Commands
 To understand how control/interface circuit 80 functions, and to understand the organization of P-RAM 82 and the command/status registers in RXTX 90 and PCTL 92, it is helpful to list the commands which occur within  control/interface unit 80. These commands may be separated into three categories: network commands processed by RXTX 90, PCM highway commands processed by
PCTL 92, and RXTX/PCTL commands for communication between
RXTX circuit 90 and PCTL circuit 92.



  Network Commands
 The following is a list of network commands:
 Transmit timing mark (TX TM);
 Transmit signalling packet (TX SP);
 Transmit claiming voice packet (TX CVP);
 Transmit voice packet (TX VP);
 Transmit boot packet (TX BP);
 Transmit silence (TX Silence);
 Receive timing mark (RX TM);
 Receive signalling packet (RX SP);
 Receive voice packet (RX VP); and
 Receive boot packet (RX BP).



  PCM   Highway    Commands
 The following is a list of PCM highway commands:
 Transmit idle;
 Transmit voice;
 Transmit tone;
 Transmit receive PCM highway data;
 Receive idle;
 Receive voice with gain switching;
 Receive tone with gain switching;
 Receive long tone without gain switching;
 Receive short tone - terminate this cycle;
 Receive long tone - terminal this cycle.



  The RXTX/PCTL commands will be discussed later.



  P-RAM ORGANIZATION
 To support the foregoing commands, P-RAM 82 is  organized as follows. As noted in Table A-3, the addresses are listed in hexadecimal. The numbers in parenthesis following the block definition is the number of bytes in the block.



  Page Number   PA < 13 :18 >     Function 0 - >  7 These pages contain the actual Tx and
 Rx ring buffers. There is one Tx and
 one Rx buffer for each timeslot on
 the PCM Highway. Each buffer is 32
 bytes long. This prevents the bit
 shifting performed by the HRU 50
 reclocking mechanism from causing the
 PCM highway to receive certain data
 samples twice and missing others
 entirely. The individual buffers are
 located as follows:
 PA < 10:6 >  = PCM Highway timeslot
 number
 PA < 5 >  =
 0 - Transmit (to network)
 direction
 1 - Receive (to codec) direction
 PA  < 4:0 >  = Location (0 to 31) in each
 ring buffer 8 This page contains the 8 byte command
 blocks for each PCM Highway timeslot
 used by the PCM Highway state
 machine. These command blocks
 include the actual command as well as
 the ring buffer pointers and the
 vectors to tone and gain pad buffers.



   It is organized as follows:
 PA  < 7:3 >  - PCM Highway timeslot
 number
 PA < 2:0 >  =
 0 - PCM Highway timeslot command
 1 - Gain switching pad page
 number
 2 - Tone page number
 3 - Current pointer into tone
 buffer  
 4 - PCM Hwy Rx Rd pointer and
 state
 5 - Network Rx Wr pointer
 6 - PCM Hwy Tx Wr pointer and
 state
 7 - Network Tx Rd pointer 9 This page contains four tables,
 located as follows:
 PA  < 7:6 >  =
 0 - Network Transmit active
 Table
 PA < 5 > =
 0 - Forward Frame times lot
 1 - Reverse Frame times lot
 PA < 4:0 >  = Voice Timeslot
 Number (2 through 29)
 1 - Network Receive Active
 Table
 PA < 5 >  =
 0 - Forward Frame timeslot
 1 - Reverse Frame times lot
 PA < 4:0 >  = Voice Timeslot
 Number (2 through 29)
 2 - Transmit Timing Mark
 Buffer. 

  This buffer
 contains the data to be
 sent during a timing mark
 if this control/interface
 circuit is configured as a
 TM Master (discussed
 below). The bytes are
 written into this buffer by
 the CPU, starting at
 location 0, in the order
 they are to be sent.



   3 - Receive Timing Mark Buffer.



   This buffer contains the
 data received during the
 last timing mark. The data
 is stored, starting at
 location 0, in the order it
 is received from the  
 network.



     OA    This page contains the SP transmit
 and receive data buffers. They are
 located as follows:
 PA < 7 > =
 0 - SP Transmit Data Buffer. This
 buffer contains the data to be
 sent out during the next Tx SP
 command. The data should be
 sorted, starting at location 0,
 in the order it is to be
 transmitted. The first three
 bytes are assumed to be two
 least significant bytes of the
 destination address and the
 control byte. Except for the
 first SP after a reset, all Tx'd
 SPs will transmit bytes 0 - >  59
 from this buffer and then append
 a CRC.



   1 - SP Receive Data Buffer. This
 buffer contains the last SP
 received from the network. If
 the "SP Rx'd" bit is set, the SP
 has passed the Rx'd SP hash and
 its Rx'd CRC checked, and will
 not be overwritten by new Rx'd
 SPs until this bit is cleared.



   The Rx SP hash circuitry assumes
 the first three bytes of the SP
 are as mentioned above.



     OB    This page contains the following four
 tables:
 PA < 7:6 >  =
 0 - Busy/Free Table. This table
 indicates whether there is
 activity on each Network
 timeslot. The value in each
 entry is the consecutive number
 of cycles in which no activity
 has been sensed on the timeslot.



   This value pegs at 255. This
 table will not be valid until
 255 cycles after a receive modem
 channel change (however it can
 be used after waiting the "Free
 threshold" number of cycles  
 after the channel change).



   PA < 5 >  =
 0 - Forward Frame times lot
 1 - Reverse Frame times lot
 PA < 4:0 >  = Net Rx timeslot number
 1 - Receive SP Hash Table. These 32
 bytes (256 bits) contain the
 hash tables for each of the four
 SP address spaces (one per
 channel). The hash table is
 computed and written by the CPU
 reflecting the network addresses
 for which it is listening.



   PA < 5 >  = 0
 PA < 4:3 >  - Address Space number.



   PA < 2:0 > : - Hash value.



   2 - Claiming Voice Packet Data
 buffers. The transmit buffer
 contains the data to be
 transmitted during the next Tx
 CVP command. The first 16 bytes
 of this buffer are transmitted
 onto the network during the CVP.



   The receive buffer contains the
 16 bytes received from the
 network during the CVP.



   PA < 5 >  =
 0 - Transmit CVP buffer.



   1 - Receive CVP buffer.



   3 - TX'd CRC table. This table
 contains the CRCs of all packets
 transmitted the past frame. It
 is used exclusively by
 control/interface 80 to monitor
 collisions (TMs, SPs, and CVPs)
 and bit errors (normal VPs).



  0C This page contains the 26 byte
 Transmit Boot Buffer 0.



     OD    This page contains the 256 byte  
 Transmit Boot Buffer 1.



     OE    This page contains the 256 byte
 Receive Boot Buffer 0.



  OF This page contains the 256 byte
 Receive Boot Buffer 1.



  10 This page contains the timeslot
 interchangers (TSIs) used by the
 Network   Tx    and Rx state machines to
 find the PCM Highway ring buffer it
 should use for a given network
 timeslot. It is organized as
 follows:
 PA < 7:6 >  =
 0 - Network Receive Machine TSI
 1 - Network Transmit Machine TSI
 2,3 - Unused
 PA < 5 >  =
 0 - Forward Frame timeslot
 1 - Reverse Frame timeslot
 PA < 4:0 >  = Network timeslot number
 Data < 4:0 >  = Ring buffer to be used 11 - >    1F+    These pages are used to hold
 individual ones or gain tables. The
 CPU selects one of these pages,
 writes the tone or gain table in the
 page, and then places this page
 number in byte 1 or 2 of the desired
 PCM Highway timeslot command block in
 page 8.

  When the command itself is
 written to byte 0 of the same block,
 the PCM Highway state machine will
 use the referenced tone and/or gain
 table. In the case of receive-only
 tone modes, multiple pages are used
 to hold a single tone.



   As noted above, P-RAM 82 contains not only the ring buffers used for transmitting the actual data between codec 75 and modem 70, but a number of command and status byte locations. The following tables and  descriptions provide the bit assignments for the latter.



  PAGE 8
PCM Hiahwav Timeslot Command PA < 2:0 > =0
EMI50.1     


<tb> Codec <SEP> Codec <SEP> PCTL <SEP> Tx <SEP> Cmd <SEP> Tx <SEP> Cmd <SEP> Rx <SEP> Cmd <SEP> Rx <SEP> Cmd <SEP> RxCmd
<tb> Rx <SEP> En <SEP> Tx <SEP> En <SEP> Enable <SEP> bit < 1 >  <SEP> bit < 0 >  <SEP> bit <SEP>  < 2 > 
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP>     <SEP> b2 <SEP> bl    <SEP> 
<tb> 
 Table B-l
The bits are defined as follows:
Bits Name Function  < 2:0 >  PCM Hwy Rx These bits command the PCM
 Timeslot Highway state machine to perform
 a sequence of operations for this Receive
 PCM timeslot ("receive" from the codec's
 point-of-view). The options are:
 0 - Idle; no transfers. Any
 voice data received from
 the network is discarded.



   1 - Transfer Voice from this
 time-slot's receive
 (from Network) ring
 buffer through the gain pad
 Highway.



   2 - Transfer Tone (from P
 RAM tone buffer after
 passing through gain pad to
 PCM Highway).



   3 - Transfer Long Tone ( > 256
 bytes) to PCM Highway.



   4 - Same actions as "0".



   5 - Same actions as "1".



   6 - Transfer Tone (from PRAM
 tone buffer) after
 passing through gain pad
 to PCM Highway - stop
 after this tone cycle.



   7 - Transfer Long Tone ( > 256
 bytes) to PCM Highway   
 stop after this tone
 cycle.



   < 4:3 >  PCM Hwy Tx These bits command the PCM
 Highway state machine to
 perform a sequence of operations
 for this Transmit PCM timeslot
 ("transmit" from the codec's
 point-of-view). The options are:
 0 - Idle; no transfers. Any
 voice data received from
 a codec or SPU is
 discarded.



   1 - Transfer Voice from PCM
 Highway to this
 timeslot's transmit (to
 Network) ring buffer.

 

   2 - Transfer Tone retrieved
 for this timeslot's Rx
 Command (as read from
 tone buffer before level
 switching) to transmit
 ring buffer (If the Rx
 command is not one of
 the "tone" commands,
 this Tx command will
 place garbage in the
 transmit ring buffer).



   3 - Transfer Receive PCM
 timeslot information to
 this timeslot's
 transmit ring buffer.



   (If this PCTL is
 transmitting onto the
 PCM Highway during the
 receive time-slot, this
 command loops the data
 back.) 5 Rx PCM High- This bit, when set, enables PCTL to act
 way Output ually transmit onto the Receive PCM
 Enable highway during this PCM timeslot.



   Hence, the receive information retrieved
 by the PCM Hwy state machine is shifted
 onto the receive highway destined for
 the codecs. If this bit is zero, any
 data retrieved by the state machine is
 not actually transmitted as the output  
 buffer stays tri-stated. This bit must
 only be set if this PCTL chip is to
 transmit onto this timeslot. At all
 other times it must be zero. If
 multiple PCTL chips are driving a single
 Receive PCM Highway, this bit must only
 be set in at most one PCTL's P-RAM for
 each PCM Highway timeslot.



  6 Generate Codec This bit, when set in the command byte
 Transmit Enbl of timeslot N, causes the PCTL chip to
 generate a transmit enable to the attached
 codec in timeslot N. These enables are
 actually given only if the appropriate bit
 in the PCTL Mode register is set (see
 below).



  7 Generate Codec This bit, when set in the command byte
 Receive Enable of timeslot N, causes the PCTL chip to
 generate a receive enable to the
 attached codec in timeslot N. These
 enables are actually given only if the
 appropriate bit in the PCTL Mode register
 is set.



  Gain Switching Pad Page Number (PA < 2:0 > =1)
EMI52.1     


<tb> Pad <SEP> Pad <SEP> Pad <SEP> Pad <SEP> Pad <SEP> Pad <SEP> Pad <SEP> Pad
<tb> Pg < 7 >  <SEP> Pg < 6 >  <SEP> Pg <SEP>  < 5 >  <SEP> Pg < 4 >  <SEP> Pg < 3 >  <SEP> Pg < 2 >  <SEP> Pg < 1 >  <SEP> Pg < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-2
Bits Name Function  < 7:0 >  PAD Page These bits form the page number of the
 Number gain switching PAD to be used for
 this PCM Highway timeslot. In the case of
 a receive-only tone command, which does
 not involve a PAD operation, this byte
 contains the first page of the tone.  



  Tone Pare Number (PA < 2:0 > =2)
EMI53.1     


<tb> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone
<tb> Pg < 7 >  <SEP> Pg < 6 >  <SEP> Pg < 5 >  <SEP> Pg < 4 >  <SEP> Pg < 3 >  <SEP> Pg < 2 >  <SEP> Pg < 1 >  <SEP> Pg < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bo
<tb> 
 Table B-3
Bits Name Function  < 7:0 >  Tone Page These bits form the page number of the
 Number Tone to be used for this PCM Highway
 timeslot command. In the case of a
 receive-only tone, which generates a
 tone requiring multiple pages of P-RAM,
 this byte is the tone page currently
 being read.



  Current Pointer Into Tone Buffer (PA < 2:0 > =3)
EMI53.2     


<tb> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone <SEP> Tone
<tb> Ptr < 7 >  <SEP> Ptr < 6 >  <SEP> Ptr < 5 >  <SEP> Ptr < 4 >  <SEP> Ptr < 3 >  <SEP> Ptr < 2 >  <SEP> Ptr < 1 >  <SEP> Ptr < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-4
Bits Name Function  < 7:0 >  Tone Pointer This byte is the pointer into the tone
 buffer being used for this PCM Highway
 timeslot command. It points at the next
 tone sample to be read by the state
 machine and sent to the codecs and/or
 the transmit ring buffer. It is reset
 to zero when it reads a tone sample of
   0    (negative full-scale). Hence, this
 value is used to start another cycle of
 the tone buffer.

  Any real samples equal
 to   0    in the tone should be changed to
 Olh before being used. The sample read
 as   0    will be transmitted as OFFh (zero),
 so the tone should be written into the
 buffer such that its last sample is
 zero   (oFFh).   



   If a "stop after this cycle" tone mode
 is selected via the PCM Hwy Rx Timeslot
 Command, the tone will be sent out  
 normally until the end of the current
 tone cycle; the pointer will then
 remain pointing at the 0 tone sample
 rather than being reset to zero, thus
 sending silence   (OFFh)    to the Rx PCM Hwy
 (and the Network if so selected) until
 the PCM Hwy Rx Timeslot Command is
 changed.



  PCM Hwy Rx Read Pointer and State (PA < 2:0 > =4)
EMI54.1     


<tb> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCMRx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx
<tb> SLEP <SEP> St < 1 >  <SEP> ST < 0 >  <SEP> RD < 4 >  <SEP> RD < 3 >  <SEP> RD < 2 >  <SEP> RD < 1 >  <SEP> RD < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-5
The bits in the PCM Hwy Rx Read Pointer should be initialized to all zeros before setting up a connection for a given PCM
Highway Receive timeslot. CPU 72 should not write to this location during the connection, as doing this could corrupt
PCTL State Machine operation.



  Bits Name Function  < 4:0 >  PCM Receive This is the next location to be read
 Read Pointer by the PCM Highway state machine from
 the receive ring buffer for this PCM
 Highway timeslot.



   < 6:5 >  PCM Receive These bits indicate the state of the
 State PCM Receive Read process for this time
 slot. They are interpreted as follows:
 O - Idle state. Network Rx
 Write Pointer is equal to
 PCM Rx Read Pointer.



   Silence is given to codec,
 and the PCM Rx Read pointer
 is left unchanged.



   1 - Filling ring buffer. This
 state is entered from state
 0 when the pointers are
 detected not equal (i.e. the
 Network Rx Write Pointer has
 changed.) Silence is given
 to codec, and the PCM Rx
 Read pointer is left
 unchanged. State 2 is  
 entered always the next time
 the PCM Highway state
 machine processes this
 timeslot.



   2 - Normal mode. The Network Rx
 Write pointer is checked
 against the PCM Rx Read
 pointer - if they are equal,
 silence is given to the
 codecs and state 0 is
 entered. Otherwise, the
 PCM Rx Read pointer is used
 to read a byte of
 information from the
 receive ring buffer, the
 byte is sent to the codec,
 and the pointer is
 incremented (mod 32) and
 written back to P-RAM.



   < 7 >  PCM Rx Read This bit, if set, indicates that state 0
 Slip has been entered from state 2 (see
 above) at least once since this
 connection was established.



  Network Rx Write Pointer (PA < 2:0 > =5)
EMI55.1     


<tb> Net <SEP> Rx <SEP> X <SEP> X <SEP> Net <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx
<tb> SLIP <SEP> St < 1 >  <SEP> ST < 0 >  <SEP> RD < 4 >  <SEP> RD < 3 >  <SEP> RD < 2 >  <SEP> RD < 1 >  <SEP> RD < 0 > 
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
 Table B-6
The bits in the Network Rx Write Pointer should be initialized to all zeros before setting up a connection for a given PCM
Highway Receive timeslot. CPU 72 should not write to this location during the connection, as doing this could corrupt
PCTL State Machine operation.

 

  Bits Name Function  < 4:0 >  Network Rcv This is the next location in the receive
 Write Pointer ring buffer to be written by the
 Network Rx State Machine. This machine
 always writes 16 bytes at a time, and
 updates the pointer after each burst
 write. Hence, its value should always
 be   0    or 16.



   < 7 >  Network Rx This bit, when set, indicates that there  
 Slip has been at least one instance where the
 Network Rx State Machine was active
 and could not write an incoming VP into
 the appropriate receive ring buffer be
 cause the PCM Rx Read Pointer would be
 passed. The Network Rx State Machine,
 when logging this error, inhibits
 writes to the ring buffer and does not
 change the pointer.



  PCM Hwv Tx Write Pointer and State (PA < 2:0 > =6)
EMI56.1     


<tb> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx
<tb> Slip <SEP> State <SEP> Wr < 4 >  <SEP> Wr < 3 >  <SEP> Wr < 2 >  <SEP> Wr < 1 >  <SEP> Wr < 0 > 
<tb> I <SEP>    I    <SEP> I <SEP>    I    <SEP> I <SEP> ¯¯¯ <SEP>    I    <SEP>    I    <SEP>    '    <SEP>    I    <SEP>    I    <SEP> 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP>    bl <SEP> bO    <SEP> 
<tb> 
 Table B-7
The bits in the PCM Hwy Tx Write Pointer should be initialized to all zeros before setting up a connection for a given PCM
Highway Transmit timeslot.

  Software should not write to this location during the connection, as doing this could corrupt
PCTL State Machine operation.



  Bits Name Function  < 4:0 >  PCM Transmit This is the next location to be written
 Write Pointer by the PCM Highway state machine to
 the transmit ring buffer for this PCM
 Highway timeslot.



   < 5 >  PCM Transmit This bit indicates the state of the
 State PCM Transmit Write process for this
 timeslot. It is interpreted as
 follows:
 0 - Idle state. Network Tx Read
 Pointer is equal to PCM Tx Write
 Pointer. Received codec data is
 discarded, and the PCM Tx Write
 pointer is left unchanged.



   1 - Normal Mode. This state is
 entered from state 0 when the pointers
 are detected not equal (i.e. the
 Network Tx Read Pointer has
 changed.) When this state is entered,
 the current PCM Tx Write pointer is
 summed with 19 modulo 32 (to place
 write pointer just ahead of read  
 pointer), and the codec data is
 written to location. The PCM Tx Write
 pointer is then incremented from that
 value (mod 32) and written back to
 P-RAM.



   Every subsequent time this timeslot is
 accessed, the PCM Tx Write pointer
 iscompared to the Net Tx Read
 pointer -if they are equal, the
 received codecdata is discarded and
 idle state   (0) is    entered. Otherwise,
 the PCM TxWrite pointer is used to
 write the codec information to the
 transmit ringbuffer. The pointer is
 then incremented (mod 32) and written
 back to P-RAM.



   < 7 >  PCM Tx Write This bit, if set, indicates that state 0
 Slip has been entered from state 1 (see
 above) at least once since this
 connection was established.



  Network Tx Read Pointer (PA < 2:0 > =7)
EMI57.1     


<tb> Net <SEP> Tx <SEP> X <SEP> X <SEP> Net <SEP> Tx <SEP> Net <SEP> Tx <SEP> Net <SEP> Tx <SEP> Net <SEP> Tx <SEP> Net <SEP> Tx
<tb> Slip <SEP> Rd < 4 >  <SEP> Rd < 3 >  <SEP> Rd < 2 >  <SEP> Rd < 1 >  <SEP> Rd < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-8
The bits in the Network Tx Read Pointer should be initialized to all zeros before setting up a connection for a given PCM
Highway Transmit timeslot. CPU 72 should not write to this location during the connection, as doing this could corrupt
PCTL State Machine operation.



  Bits Name Function  < 4:0 >  Network Tx This is the next location in the
 Read Pointer transmit ring buffer to be read by the
 Network Tx State Machine. This always
 reads 16 bytes at a time, and
 updates this pointer after this burst
 read. Hence, its value should always
 be   0    or 16. If data is requested for
 transmission when the corresponding PCM
 Hwy Tx Write Pointer's state is idle,
 data is delivered from the Tx silence
 buffer (rather than from the transmit  
 ring buffer), and the Net Tx Rd Pointer
 is updated as if data had been read.



   < 7 >  Network Tx This bit, when set, indicates that there
 Slip has been at least one instance where the
 Network Tx State Machine was active
 and could not read an outgoing VP from
 the appropriate transmit ring buffer be
 cause the PCM Tx Write Pointer would be
 passed. The Network Tx State Machine,
 when logging this error, inhibits
 reads from the ring buffer and gives
 data from the Tx Silence Buffer in re
 sponse to the RxTx requests. It also
 leaves the pointer unchanged.



  PAGE 9
Network Transmit Active Table Entry (PA < 7:6 > =0)
EMI58.1     


<tb> Tx <SEP> Tx <SEP> X <SEP> Chanl <SEP> Chanl <SEP> Chanl <SEP> Tx <SEP> Cmd <SEP> Tx <SEP> Cmd
<tb> Slnc <SEP> PS <SEP>  < 2 >  <SEP>  < 1 >  <SEP>  < 0 >  <SEP>  < 1 >  <SEP>  < 0 > 
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
 Table B-9
Bits Name Function  < 1:0 >  Tx Active These bits indicate the action required
 Command by the Net Tx State Machine for this
 network timeslot. They are encoded
 as follows:
  < 1:0 >  =
 0 - Idle; no transmission or channel
 change required this timeslot.



   1 - Transmit Voice Packet
 2 - Transmit Boot Packet
 3 - Use this timeslot to change   Tx    Modem
 channel (no transmit allowed).



   < 4:2 >  Channel These bits form the new Tx channel
 number to be loaded into the Tx RF modem
 channel register if command 3 is selected
 above. If any other Tx Active Command is
 given, these bits are not used.  



   < 6 >  Transmit This bit, if set in conjunction with a
 Pseudo-Silence transmit command during Master-mode
 loopback, causes the RxTx chip
 to send network pseudo-silence to the
 loopback circuitry.



   < 7 >  Transmit If Tx Active Command 1 is selected via
 PCM Silence bits  < 1:0 > , this bit, if set,
 causes PCTL to send data to the network
 from the Tx Silence buffer. If this bit
 is zero, data will be sent from the usual
 transmit ring buffer.



  Network Receive Active Table Entrv (PA < 7:6 > =1)
EMI59.1     


<tb> X <SEP> X <SEP> X <SEP> X <SEP> En <SEP> Tx <SEP> Allow <SEP> Allow
<tb> CRC <SEP> ck <SEP> Disc <SEP> Rx <SEP> VP <SEP> Rx <SEP> BP
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP>    bi    <SEP>     <SEP> bO    <SEP> 
<tb> 
 Table B-10
Bits Name Function  < O >  Allow Rx This bit, if set, allows boot packets
 Boot Packet to be received from the network during
 this timeslot and placed in the current
 Rx Boot Buffer. In addition, a discon
 nect interrupt is generated and the
 Disconnect bit set if this timeslot goes
 free. If this bit is zero, any incoming
 boot packets during this timeslot are
 discarded and disconnects are ignored
 (provided bit < l >  is also zero). This
 bit is cleared by the hardware if a
 disconnect is detected on this timeslot.

 

   < 1 >  Allow Rx This bit, if set, allows voice packets
 Voice Packet to be received from the network during
 this timeslot. This data may be passed
 to a receive ring buffer depending on
 the value of this timeslot's Rx Time
 Slot Interchange entry as well as the
 receive ring buffer's Net Rx Write
 Pointer. In addition, a disconnect
 interrupt is generated and the
 Disconnect bit set if this timeslot  
 becomes free. If this bit is zero,
 any incoming voice packets during this
 timeslot are discarded (not written to
 any buffer) and disconnects are ignored
 (provided bit < 0 >  is also zero). This
 bit is cleared by the hardware if a
 disconnect is detected on this timeslot.



   < 2 >  Disconnect This bit, if set, indicates that the
 times lot became free while the Allow Rx
 BP or Allow Rx VP bits were set. This
 bit can only be cleared by CPU 72
 PCTL 92 can only set it. If the bit is
 clear, no disconnect has occurred on
 this timeslot. Hardware automatically
 clears the Allow Rx BP and VP bits when
 setting the Disconnect bit.



   < 3 >  Enable Tx This bit is used to enable comparison
 CRC Check of transmitted and received CRC values
 to detect errors. If one is trans
 mitting on network timeslot N, and
 wishes to have this comparison done and
 the CRC compare counter incremented
 based upon the results, this bit must be
 set in the Rx Active Entry for timeslot
 N+1. (If checking is required on VTS
 29, the last VTS, this bit should be set
 in the "pseudo Rx Active Entry" for TS
 0). If this bit is cleared, no CRC
 compare will be done for the previous
 timeslot. Obviously this bit should be
 clear for every Rx Active Entry follow
 ing a timeslot on which this control/
 interface circuit is not transmitting.



  PAGE B
Network Busv/Free Table   Entrv   
EMI60.1     


<tb>   I    <SEP> BF < 4 > 1 <SEP> BF < 3 > 1BF < 2 >  <SEP> I <SEP> I
<tb> I <SEP>    II    <SEP>    ¯¯¯¯¯I    <SEP> I <SEP> ¯¯¯¯¯11B/F < i > 1 <SEP> BF < 0 > 1
<tb>   I    <SEP> I <SEP> I <SEP> I <SEP> I <SEP>    I <SEP>     <SEP> I <SEP> I
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
Table B-ll  
Bits Name Function  < 7:0 >  Busy/Free This quantity gives the number of cycles
 Value since activity (anything but network
 silence for the period from the
 beginning of the expected delimiter time
 until 4 bits into data byte 1 of the ex
 pected packet) has been detected on this
 network timeslot.

  Each time that
 activity is observed on this timeslot,
 this value is reset to zero. This value
 will not count past its maximum value of
 255. This table is not valid for 255
 cycles (about 0.5 seconds) following an
 Rx RF Modem channel change.



  Hash Table Entry
EMI61.1     


<tb> I <SEP> | <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-12
Bits Name Function  < 7.. 0 > : HASH Set if device is a member of a
 particular address
 class. Each bit represents an
 address class.



  PAGE 10
Network Receive - PCM Timeslot Map Entry
EMI61.2     


<tb> Active <SEP> X <SEP> X <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx <SEP> PCM <SEP> Rx
<tb> /Idle* <SEP> TS < 4 >  <SEP> Ts < 3 >  <SEP> Ts < 2 >  <SEP> Ts < 1 >  <SEP> Ts < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-13
These locations are written by CPU 72 to map Network timeslots on which data is being received to receive ring buffers and thus PCM Highway Receive Timeslots. The mapping should be set up by CPU 72 as part of establishing the connection. The
Active/Idle* bit can be set or cleared at any time during a connection. This bit should be zero for all Network timeslots on which nothing should be received.  



  Bits Name Function  < 4:0 >  PCM Receive The PCM Highway Receive timeslot
 Timeslot and ring buffer used to store voice data
 received from the network during this
 (as indicated by address) network
 timeslot.



  7 Active/Idle* This bit, when zero, inhibits the
 Network Rx State Machine from writing
 incoming voice packets into the selected
 receive ring buffer or updating the
 Network Rx Write Pointer. When this bit
 is set, received voice packets are
 written into the selected receive ring
 buffer and the Network Rx Write Pointer
 is updated normally.



  Network Transmit -PCM Times lot Map   Entrv   
EMI62.1     


<tb> Active <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx <SEP> PCM <SEP> Tx
<tb> /Idle* <SEP> TS < 4 >  <SEP> TS < 3 >  <SEP> TS < 2 >  <SEP> TS < 1 >  <SEP> TS < 0 > 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-14
These locations are written by CPU 72 to map Network Timeslots on which voice data is being transmitted to PCM Highway
Transmit timeslots and ring buffers. The mapping should be set up by CPU 72 as part of establishing the connection.

  The
Active/Idle* bit can be set or cleared at any time during a connection This bit should be zero for all Network timeslots on which nothing is being transmitted (this bit does not actually control the Network Transmit, however the PCTL Network
Tx State Machine makes fewer accesses to P-RAM if it is zero).



  Bits Name Function  < 4:0 >  PCM Transmit The PCM Highway Transmit timeslot
 Timeslot and ring buffer used to retrieve voice
 data to be sent to the network during
 this (as indicated by address) network
 timeslot.



   < 7 >  Active/Idle* This bit, when zero, inhibits the
 Network Tx State Machine from reading
 voice packets out of the selected
 transmit ring buffer or updating the  
 Network   Tx    Read Pointer. If the Net
 Tx Active Table indicates a voice
 transmission on this timeslot, data is
 fetched from the Tx Silence Buffer.



   When this bit is set and the   Tx    Active
 Table indicates a voice transmission on
 this timeslot, data is fetched from the
 selected transmit ring buffer and the
 Network   Tx    Read Pointer is updated
 normally.



  COMMAND AND STATUS REGISTERS
In addition to the command and status registers described for
P-RAM 82, RXTX 90 and PCTL 92 contain command and status registers in their respective CPU interfaces 132 and 166. A description of these registers follows.



  PCTL Registers
PCTL 92 contains several registers in CPU interface 166 which are accessible to CPU 72. They are used to select the operating modes of the circuit as well as gain useful status information. All command registers may be read as well as written by CPU 72. Status registers, of course, are read-only.

 

  PCTL Transmit Status Register
EMI63.1     


<tb> FIFO <SEP> Cur <SEP> Empty <SEP> Boot
<tb> X <SEP> X <SEP> X <SEP> X <SEP> Error <SEP> Buffer <SEP> Buffer <SEP> Switch
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-15
Bits Name Function  < 3 >  FIFO Error This bit is set (=1) if the Tx Ring
 Buffer pointers (Net   Tx    Read Pointer
 and PCM Hwy   Tx    Write Pointer) are
 misaligned in such a way that data is
 overwritten or duplicated.



   < 2 >  Cur Buffer This bit tells the RxTx chip which
 Boot Buffer (0 or 1) has new data to
 be sent to the network. The RxTx will
 then know which boot delimiter to
 send.



   < 1 >  Empty Buffer This bit tells the RxTx chip which
 Boot Buffer (0 or 1) has just been  
 emptied and therefore needs new data
 from the CPU. This bit is copied into
 a BP status register that the CPU
 can read. This bit is valid when the
 Boot Switch bit is set.



   < 0 >  Boot Switch This bit is set when the Boot Buffer
 pointer has just changed states. It
 tells the RxTx chip to generate an
 interrupt the next possible time.



  PCTL Receive Status Register
EMI64.1     


<tb> FIFO <SEP> TMs <SEP> HASH <SEP> Abnorm <SEP> Full <SEP> Boot
<tb>  <SEP> Disc <SEP> Error <SEP> X <SEP> Missed <SEP> Passed <SEP> Switch <SEP> Suffer <SEP> Switch
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-16
Bits Name Function  < 7 >  Disc This bit is set if the connection to the
 far-end device is dropped. Disconnect is
 detected when a time slot has B/F=free AND
 the active table indicates a connection
 should exist. This bit tells the RxTx
 chip to set an interrupt.



   < 6 >  FIFO Error This bit is set when the Rx Ring Buffer
 pointers (the Net Rx Write Pointer and the
 PCM Hwy Rx Read Pointer) are misaligned and
 allows data to be overwritten or
 duplicated.



   < 4 >  TMs Missed This bit is set to indicate that the TM
 Missed threshold was reached - a critical
 failure. This bit is copied into a register
 that the CPU can read and an interrupt
 will be generated. The threshold is
 determined by the CPU and specified in a
 threshold register in Chapter 6.



   < 3 >  Hash Passed This bit indicates that the SP HASH was
 passed and tells the RxTx chip that the CRC
 match results are meaningful.



   < 2 >  Abnorm This bit is valid only if the "Boot Switch"
 Switch bit is set. It indicates if the boot buffer
 switch was expected.



   < 1 >  Full Buffer This bit gives the number of the Boot
 Buffer that has been recently filled. It is  
 copied into a register that the CPU can
 read. It is valid only when the "Boot
 Switch" bit is set.



   < 0 >  Boot Switch This bit is set when the boot buffer
 pointer changes states. It is copied into
 a register that the CPU can read and,
 with the "Abnorm Switch" and "Full Buffer"
 bits, the CPU has enough information to
 determine whether the latest boot reception
 was successful.



  Mode Register
This register is used to place control/interface circuit 80 in its various operating modes. The bits are organized as follows:
EMI65.1     


<tb> PCM <SEP> TS <SEP> Cntr <SEP> Codec <SEP> PCM <SEP> Hy <SEP> 5M <SEP> Clk <SEP> Codec <SEP> PCM <SEP> Hy
<tb>  <SEP> OE <SEP> Test <SEP> OE <SEP> master <SEP> OE <SEP> Mode <SEP> Enable <SEP> Reset
<tb>   I    <SEP>    I    <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
 Table B-17
This register is cleared (i.e. all bits are reset to 0) when the PCTL reset signal is activated. All bits in this register may be read as well as written by CPU 72.

  The bits are defined as follows:
Bits Name Function  < 0 >  Reset This bit, when cleared, places PCTL 92
 in Reset mode. In this mode, all state
 machines are held in a reset state and
 can not perform accesses to P-RAM 82.



   CPU 72, however, can still access P
 RAM 82. When this bit is set to "1", PCTL
 92 operates normally.



   < 1 >  PCM Highway This bit, when cleared, inhibits PCTL 92
 Enable from actually driving the PCM Highway
 output bus, regardless of what it is
 told by the PCM Hwy state machine 162.



   < 2 >  Codec/SPU This bit is used to select the type of
 Mode codec enables to be generated by PCTL.



   A "0" selects PCM Highway transmit and
 receive enable signals compatible with
 National TP3054 and Intel 2913/4 codec/
 filter chips and TI 32020/320C25 Signal
 Processors. A "1" selects enable
 signals compatible with Motorola   MC14400     
 series codec/filter chips.



   < 3 >  5   NHz    Clock This bit, when set, enables the driver
 Output Enable which sends PCTL's Master Clock to the
 5.018 MHz clock out pin. When the bit
 is cleared, the driver is tri-stated.



   < 4 >  PCM Highway This bit, when set, enables the drivers
 Master which transmit the PCM Highway State
 Machine's "Reset to PCM Timeslot 0"
 and "1.544 MHz Clock" signals to the
 corresponding PCTL input/output pins.



   pin. When the bit is cleared, the
 output drivers are tri-stated.



   < 5 >  Codec Control This bit, when set, enables PCTL's PCM
 Output Enables Highway transmit and receive codec/
 filter control signals. If this bit is
 zero, these pins are tri-stated.



   < 6 >  Counter Test This bit, when set, places PCTL in its
 Mode counter test mode. In this mode, PCTL
 allows all of its error counters to
 increment as if errors are being
 received. When this bit is cleared, all
 error counters operate in their normal
 mode.



   < 7 >  PCM Timeslot This bit, when set, commands PCTL to
 Counter Output drive its PCM Highway Timeslot Counter
 Enable output pins. If this bit is zero, these
 pins are tri-stated.



  Threshold Register
This register is used to select two thresholds. The first is the number of consecutive cycles a Network times lot must be unoccupied before the times lot is declared to be free and a disconnect generated (if required). The second is the number of consecutive receive Timing Marks which must be missed before an interrupt is given to the CPU.

  The bits are organized as follows:
EMI66.1     


<tb> X <SEP> X <SEP> X <SEP> X <SEP> Missed <SEP> Missed <SEP> Free <SEP> Free
<tb>  <SEP>  < 1 >  <SEP>  < 0 >  <SEP>  < 1 >  <SEP>  < 0 > 
<tb>   I    <SEP>     <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯ <SEP> I <SEP> ¯¯    <SEP> 
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
Table B-18  
This register is cleared (i.e. all bits are reset to 0) when the PCTL reset signal is activated. All bits in this register may be read as well as written by CPU 72.

  The bits are defined as follows:
Bits Name Function  < 1:0 >  Free These bits set the Busy/Free "Free"
 Threshold threshold as follows for all network
 timeslots:
  < 1:0 >  =
 0 - 8 consecutive silent cycles
 1 - 16 consecutive silent cycles    2 - 32 consecutive silent cycles
 3 - 64 consecutive silent cycles     < 3:2 >  Rx TM Missed These bits set the consecutive Rx TM
 Threshold missed interrupt threshold:
  < 3:2 >  =
 0 - Interrupt on 16 consecutive
 missed receive Timing Marks.



   1 - Interrupt on 32 consecutive
 missed receive Timing Marks.



   2 - Interrupt on 64 consecutive
 missed receive Timing Marks.



   3 - Interrupt on 128 consecutive
 missed receive Timing Marks.

 

  RX SP Buffer Status Register
EMI67.1     


<tb> Rx <SEP> SP <SEP> Missed <SEP> Missed <SEP> Missed <SEP> Missed <SEP> Missed <SEP> Missed <SEP> Missen
<tb> BfFull <SEP> SP < 6 >  <SEP> SP < 5 >  <SEP> SP < 4 >  <SEP> SP < 3 >  <SEP> SP < 2 >  <SEP> SP < 1 >  <SEP> SP < 0 > 
<tb> I <SEP> ¯¯¯¯ <SEP> I <SEP> ¯¯¯¯ <SEP> I <SEP> ¯¯¯¯ <SEP> I <SEP> ¯¯¯¯ <SEP> I <SEP> ¯¯¯¯ <SEP> I <SEP> ¯¯¯¯ <SEP> I    <SEP> ¯¯¯¯ <SEP> I <SEP> ¯¯¯¯ <SEP> I    <SEP> 
<tb> I <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I <SEP> I
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl
<tb> 
 Table B-19
Bit 7 of this register may be read and written by CPU 72; the remaining bits are read-only. Bits < 6:0 >  of this register are cleared after a CPU read - they are unknown after a hardware reset.

  The bits are defined as follows:  
Bits Name Function  < 6:0 >  Missed Rx These bits contain the number of SPs
 SP Count received by this control/interface circuit
 80 which passed the Rx address hash but
 were not accepted because the Rx SP data
 buffer was full. It will not count past
 its maximum value of 127, and is reset to
 zero after each CPU read access. This
 quantity may only be read; writes to
 this register will not affect these
 bits.



   < 7 >  Rx SP Data This bit, when set, indicates that a
 Buffer Full valid SP has been received by this
 control/interface circuit 80 and placed in
 the Rx SP Data Buffer. An SP is valid if
 its CRC was good and the destination
 address hash was passed. RXTX 90
 will not place another Rx SP into the
 Rx SP data buffer until this bit has
 been cleared by software. This bit can
 be read and written by CPU 72.



  Transmit Boot Buffer Register
EMI68.1     


<tb> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> Ts <SEP> Bt
<tb> Buffer
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-20
This register is cleared (i.e. reset to 0) when the PCTL reset signal is activated. The bit is defined as follows:
Bits Name Function  < 0 >  Current Tx This bit gives the current transmit boot
 Boot Buffer buffer being used (or to be used) by
 PCTL 92. A "0" indicates boot buffer 0 is
 currently selected, while a "1" means
 buffer 1 is being used. This bit can be
 written as well as read by CPU 72. It
 should not be written, however, while Tx
 BPs are being transmitted.  



  Receive Boot Buffer Register
EMI69.1     


<tb>   I    <SEP>    X    <SEP> X <SEP>    I    <SEP>    X    <SEP>    X    <SEP>    I    <SEP>    X    <SEP>    X    <SEP>    X    <SEP> X <SEP>    1Rx    <SEP> Bt <SEP> I
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-21
This register is cleared (i.e. reset to 0) when the PCTL reset signal is activated. The bit is defined as follows:
Bits Name Function  < 0 >  Current Rx This bit gives the current receive boot
 Boot Buffer buffer being used (or to be used) by
 PCTL 92. A "0" indicates boot buffer 0 is
 currently selected, while a "1" means
 buffer 1 is being used.

  This bit can be
 written as well as read by software. It
 should not be written, however, while Rx
 BPs are being received.



  Transmit Boot Pointer Register
This register contains the pointer into the currently selected transmit boot buffer. It is used to read the next 16 bytes of boot information from the selected boot buffer during a Tx BP timeslot. It can be written and read by CPU 72, although it should not be written while Tx BPs are being sent by this PCTL circuit. The entire 8 bits of this register form the pointer, as each boot buffer is 256 bytes long.



  Receive Boot Pointer Register
This register contains the pointer into the currently selected receive boot buffer. It is used to write the next 16 bytes of boot information to the selected receive boot buffer during a
Rx BP timeslot. It can be written and read by the software, although it should not be written while Rx BPs are being received by this PCTL circuit. The entire 8 bits of this register form the pointer, as each boot buffer is 256 bytes long.



  Rx Timing Mark CRC Error Register
This register contains the number of Timing Marks received with CRC errors since this register was last read by CPU 72.



  It is reset to zero after each CPU read. The contents of this  register are valid for control/interface circuits in either
Master or Slave Timing Mark mode.



  Missing Rx Timing Mark Register
This register contains the number of Timing Marks missed since last read. A Timing Mark is defined as "missed" when the receiver cannot detect a valid Timing Mark delimiter within 4 bit times of where it is expected OR when a valid TM delimiter is received but the CRC does not check. This register is valid in either Master or Slave Timing Mark mode. It is reset to zero after every CPU read access.



  Consecutive Missing Rx   TM    Register
This register contains the number of Timing Marks which have been missed consecutively. It is reset to zero when a Timing
Mark with a valid CRC is received. It is also cleared by a CPU read, allowing another "Consecutive Missed Rx TM" Interrupt to be generated at this counter goes past the Missing TM threshold set in the Threshold Register.



  Rx   TN    Out-of-Sequence Register
This register contains the number of Timing Marks received outof-sequence since last read. A received Timing Mark is deemed   "out-of-sequence"    when it is received with a valid CRC and a frame number which is not the value expected based on the previous received Timing Mark. This register is valid in either
Master or Slave Timing Mark mode. It is reset to zero after every CPU read access. Non-zero values in this register generally indicate that more than one network unit is generating Timing Marks.



  Consecutive Rx Valid TN Register
This register contains the number of consecutive valid Timing
Marks received. It is reset to zero by any missing Timing Mark or Timing Mark with an unexpected frame number. A valid   Timing   
Mark is defined as a TM with a good CRC and the expected frame number. Note that this register is not cleared during reset; hence its contents are unknown for the first 255 cycles the control/interface circuit is in Receive Frame lock (with the
Interconnect).



  Tx Packet Bit Error Register
This register contains the number of transmitted packets, including regular VPs, which were received back from the  network in error. This check is done by computing a CRC on each packet transmitted, and computing a CRC on the same packet coming back from the network. If the two CRCs do not match,
AND the corresponding "Enable   Tx    CRC Check" bit is set in the
RX Active Table entry, the   Tx    Packet Bit Error Counter will be incremented. It is reset to zero after every CPU read.



  Voice Slip Register
This register contains the number of slips which have occurred in this PCTL chip since last read. A slip is a missed read or write of PCM data which occurs because ring buffer read and write pointers have attempted to cross each other. If the PCM
Highway 6.176 MHz clock is frequency-locked to the network 5.018 MHz clock, there should be no slips recorded. This register is reset to zero after every software read. A bit in the read and write pointer register of each ring buffer can be used to detect whether a slip has occurred on a particular PCM
Highway timeslot in a given direction.



  Master Clock Monitor Register
This register is used to obtain information on PCTL's Master
Clock, which is received from the Rx Modem. This monitor operates using the 6.176 MHz clock provided externally, hence it may only be believed in situations where the external clock source derives 6.176 MHz from a "guaranteed good" source of 20.072 MHz clock, such as a PLL which is known to be present and operating.

 

  The register consists of two 4-bit counters. The least significant 4 bits of this register contain the number of 6.176   z    rising clock edges seen since the 5.018 MHz PCTL clock was last high; the most significant 4 bits contain the number of 6.176 MHz rising clock edges seen since this clock was last low. Both counters will not count past their maximum count of 15. If the PCTL Master clock is operational, each nibble of this register should contain 0, 1, or 2 at any time it is read by software. Higher values in either or both nibbles indicate this clock is not good. If the clock is not there at all, one nibble should be pegged at 15. Each half of this register is only cleared by the appropriate level on PCTL
Master clock.



  RXTX Registers
The RXTX circuit 90 contains several registers which are accessible to CPU 72. These registers are as follows.  



  TN Master/Slave Register
EMI72.1     


<tb>  <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> M/S
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-22
Bits Name Function  < 0 >  M/S 1 - Master
 0 - Slave (condition after reset)
 The M/S bit determines if the device
 will transmit TMs. This bit is set
 only if the device is a master TMG or
 contending to become one. This bit is
 0 after reset.



     Tm    Command/Lock Status Register
EMI72.2     


<tb>  <SEP> X <SEP> X <SEP> X <SEP> X <SEP> Lockl <SEP> Locko <SEP> TM <SEP> C¯M/S
<tb>  <SEP> Window
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-23
Bits Name Function  < 3-2 >    Lock < l. .0 >     11 - 128 consecutive good TMs
 10 - 64 consecutive good TMs
 01 - 32 consecutive good TMs
 00 - 16 consecutive good TMs
 These bits determine the number of
 consecutive good TMs that must be received
 before the RxTx "locks" the Rx frame.



   Locking is explained below.



   < 1 >  TM Window 1 - 16-bit window during predicted time
 0 - "Wide open" window (condition after
 reset)
 This bit determines how the RxTx 90
 searches for a TM delimiter during a
 frame. After reset this bit is cleared.



   This allows RxTx 90 to continuously
 search for TMs and realign the frame
 whenever a good TM packet is found. This
 means that frame "lock" does not exist yet
 and time slot boundaries are not  
 determined.



   After the lock threshold is passed
 (determined by bits 3 and 2, above),
 circuitry in the RxTx chip will
 automatically set the bit to 1. TMs will
 only be detected during the predicted
 times and the rest of the frame can be
 used as intended (time slot boundaries are
 now in place).



   The CPU can clear the bit whenever it
 wishes; the RxTx chip has no means of
 clearing this bit except during reset.



   The CPU can set the bit if it is necessary
 to recognize the lock condition sooner
 than the specified threshold. The CPU can
 read this bit at any time to determine if
 the Rx frame is locked.



   < 0 >  C¯M/S 1 - Master control/interface circuit
 0 - Slave control/interface circuit
 (condition after reset)
 This bit selects a "master"
 control/interface circuit 80 among the
 ones in a particular device. This bit is
 valid only if the TM Master/Slave bit
 (above) is a 1 since it is used to
 determine which control/interface
 circuit's "TxTM Sync" signal is used to
 synchronize all of the control/interface
 circuits when transmitting a TM. The
 master control/interface circuit should be
 chosen before arbitrating to become a
 master TMG (said another way, C M/S should
 be valid before M/S).



   Naturally, if there is only one control/
 interface circuit in a device and it is
 transmitting TMs, this bit is set. In the
 predominant TMG case, where there are four
 control/interface circuits one is chosen
 by the software and changed only
 if the chosen Chocolate's clock fails.  



     TN    Status Register
EMI74.1     


<tb> TM <SEP> X <SEP> X <SEP> X <SEP> X <SEP> Multi <SEP> lms <SEP> TMs
<tb> Int <SEP> TMs <SEP> Missed
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-24
Bits Name Function  < 7 >  TM Int This bit is set when there is an
 interrupt pertaining to Tms, making the
 information in this register valid.



   < 2 >  Multi TMs This bit is set when there
 were multiple good TMs (i.e. no CRC
 errors) received within 1 ms. This error
 will occur only when the Rx frame is not
 "locked." An interrupt will be generated
 if interrupts are enabled.



   < 1 >  lms If the Rx frame is locked and the 1
 ms interrupt is enabled, this bit will be
 set and an interrupt will be generated
 every millisecond. It does not depend on
 the reception of good TMs; an interrupt
 will be generated even if a TM is missed.



   If the Rx frame is NOT locked and the 1 ms
 interrupt is enabled, this bit will be set
 and an interrupt will be generated every 1
 ms if there are no "Multi TM" errors (see
 above).



   < 0 >  TMs Missed This bit is set when the
 threshold for consecutive TMs missed has
 been reached - a critical failure. This
 threshold is set by software in the PCTL
 chip. An interrupt will be generated if
 TM missed interrupt is enabled.



  SP Command Register - MS Byte
EMI74.2     


<tb> Cmdl <SEP> Cmdo <SEP> F <SEP> R <SEP> SP3 <SEP> SP2 <SEP> RP1 <SEP> SP0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
Table B-25  
Bits Name Function  < 7:6 >  Cmd < l. .0 >  11 Transmit SP
 10 Illegal CPU command - used by the
 hardware
 01 Illegal CPU command - used by the
 hardware
 00 No Command (condition after reset)
 Cmd    < 1.. 0 >     is cleared by the RxTx state
 machine after the expected SP delimiter
 time has passed (whether or not it was
 received). This insures that the command
 is processed only once.



   After reset and after the off-line
 loopback is engaged or disengaged,
   Cmd < 1..0 >     is set to "11" so that a skew SP
 can be sent automatically to calculate the
 skew.



   < 5:4 >  F and R 11 Transmit on either forward or reverse
 frame
 10 Transmit on next forward frame
 01 Transmit on next reverse frame
 00 Transmit an SSP on next frame (fwd or
 rev)  < 3:0 >  SP Each bit chooses one of the four SP
 partitions for transmission. Any
 combination of SP partitions can be chosen
 and the SP will be sent on the next
 eligible one.

 

   Programming Note: Do not write into the
 SP Cmd Reg (MS byte) if there is a command
 pending (i.e. when Cmd    < 1.. 0 >     does NOT
 equal "00"). The best time to issue a new
 SP command is after the previous command
 is acknowledged by an interrupt or after
 reading the SP Cmd Reg to insure that bits
 Cmd    < 1..0 >     is "00." Failure to comply will
 result in either overwriting the first
 command (if the writing of the second
 command falls in a non-SP time slot) or
 the second command will be ignored (if the
 writing of the second command falls in an
 SP time slot).  



  SP Command Register - LS Byte
EMI76.1     


<tb> Tx <SEP> 3 <SEP> Tx2 <SEP> Tx1 <SEP> Tx0 <SEP> Rx3 <SEP> Rx2 <SEP> Rx1 <SEP> Rx0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl
<tb> 
 Table B-26
Bits Name Function  < 7:4 >  Tx This selects the transmit frequency for
 the SP time slot.



   < 3. .0 >  Rx This selects the receive frequency for the
 SP time slot. These bits are valid only
 when there is a command to transmit an SP.



   The Tx and Rx frequencies should
 correspond to the same network channel.



   The default frequencies are reinstated
 after the SP time slot.



  SP Status Register
EMI76.2     


<tb>  <SEP> S <SEP> X <SEP> TX <SEP> Not <SEP> CRC <SEP> Tx <SEP> Rx <SEP> Rx
<tb> Int <SEP> SSP <SEP> Seen <SEP> MMatch <SEP> Good <SEP> Error <SEP> Good
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP>    b1    <SEP> 
<tb> 
 Table B-27
Bits    < 5.. 2 >     are meaningful when a device is receiving its own
SP. Bits    < 1..0 >     are used primarily when the received SP is from a different device, but are also valid when the SP has come from the same device.



  Bits Name Function  < 7 >  SP Int: This bit is set if there is an interrupt
 pertaining to SPs, making the information
 in this register valid.



   < 5 >  Tx SSP: This bit is set if the transmitted SP was
 for determining skew (an SSP). This bit
 is read only to the CPU, but is affected
 by reset and the loopback bit. This bit is
 set when there is a reset and when the
 loopback bit is engaged OR disengaged.



   During these times, the skew must be
 calculated. After the skew is known, this
 bit is cleared.



   < 4 >  Not Seen: This bit is set when the SP sent was not  
 detected.



   < 3 >  CRC MMatch: This bit is set when the transmitted CRC
 does NOT match ("MisMatch") the received
 CRC. This is used to help determine if the
 received SP is in fact the one
 transmitted.



   Note that it is possible to have a good
 CRC (bit   0    = 1) and a CRC mismatch at the
 same time.



   < 2 >  Tx Good: This bit is set when the transmission was
 successful. This means that CRC MMatch=0
 AND there were no bit errors in the
 received packet (the CRC checker indicates
 no errors).



   < 1 >  Rx Error: This bit is set if the received SP
 (typically from another device) has passed
 the HASH, but has a CRC error. An
 interrupt may be generated as a result if
 the CPU has enabled interrupts for
 reception of bad SPs (see Interrupt
 Command Register, Section 5.3.1.7)  < 0 >  Rx Good: This bit is set if the received SP
 (typically from another device) has passed
 the HASH and has a good CRC. An interrupt
 is always generated in this situation.



  CVP Command Register
EMI77.1     


<tb> Cmd1 <SEP> Cmd0 <SEP> F/R <SEP> TS4 <SEP> TS3 <SEP> TS2 <SEP> TS1 <SEP> TS0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-28
Bits Name Function  < 7:6 >  Cmd 11 Transmit CVP
 10 Illegal CPU command - used by hardware
 01 Illegal CPU command - used by hardware
 00 No Command (condition after reset)
   Cmd < 1..0 >     is cleared by the RxTx state
 machine after the expected CVP delimiter
 time has passed (whether or not it was
 received). This insures that the command
 is processed only once.  



   If CVP transmission is "blocked" (see CVP
 Status Register), Cmd    < 1..0 >     is cleared.



   < 5 >  F/R: This bit determines whether to claim a
 time slot in the forward or reverse frame.



   < 4:0 >  TS These bits specify the time slot to be
 claimed.



   Note that unlike the SP Command Register,
 Tx and Rx frequencies need not be
 specified since CVPs always claim time
 slots in the default channel.



  CVP Status Register
EMI78.1     


<tb> CVP <SEP> j <SEP> X <SEP> W <SEP> X <SEP> | <SEP> X <SEP> | <SEP> Not <SEP>    g <SEP>     <SEP> Block <SEP>     <SEP> CRC <SEP> '77    <SEP> 
<tb> 1Int <SEP>    Seen    <SEP>    en    <SEP> MMatch <SEP> 1Good
<tb>  <SEP> Int <SEP> Seen <SEP> MMatch <SEP> Good
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
 Table B-29
Bits Name Function  < 7 >  CVP Int This bit is set if there is an interrupt
 pertaining to CVPs, making the information
 in this register valid.



   < 3 >  Not Seen This bit is set if there was no CVP
 detected during the specified time slot.



   < 2 >  Block This bit is set if the B/F free table
 entry indicates that the time slot was
 busy before the claim was initiated. CVP
 transmission was blocked because the time
 slot was already busy.



   This condition will clear Cmd    < 1..0 >     of
 the CVP Command Register.



   < 1 >  CRC MMatch This bit is set if the received CVP CRC
 does not match the transmitted CRC, thus
 indicating collision or some other form of
 transmission error.



   < 0 >  Tx Good This bit indicates a successful seizure of
 the time slot.  



  VP Status Register
The command register for processing VPs exist in the P-RAM
Active Table. There is, however, a VP Status Register.
EMI79.1     


<tb>



  VP <SEP> X <SEP> X <SEP> X <SEP> X <SEP> Rx <SEP> Tx <SEP> Disc
<tb>  <SEP> Int <SEP> FlFO <SEP> FlFO
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP>    bl <SEP> bo    <SEP> 
<tb> 
 Table B-30
Bits Name Function  < 7 >  VP Int This bit is set if there is an interrupt
 pertaining to VPs. The only bit that
 generates an interrupt is the Disc bit,
 the others are for status only.

 

   < 2 >  Rx FIFO This bit is set if the Rx Ring Buffer
 pointers are misaligned.



   < 1 >  Tx FIFO This bit is set if the Tx Ring Buffer
 pointers are misaligned.



   < 0 >  Disc This bit is set if the connection is
 dropped. An interrupt is generated after a
 disconnect. During the interrupt routine,
 the CPU must read all Rx Active table
 entries to determine which time slot(s)
 have disconnected.



  BP Status Register
As with the VPs, the command register for processing BPs is in the PRAM Active Tables. Similarly, there is a BP Status
Register.
EMI79.2     


<tb>



   <SEP> BP <SEP> X <SEP> Switch <SEP> Rx <SEP> Buf <SEP> Rx <SEP> X <SEP> Tx <SEP> Buf <SEP> Tx
<tb> Int <SEP> Error <SEP> Num <SEP> Switch <SEP> Num <SEP> Switch
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
Table B-31  
Bits Name Function  < 7 >  BP Int This bit is set if there is an interrupt
 pertaining to   Bps,    making the information
 in this register valid.



   Bits 5 to 3 pertain to the reception of
 BPs, while bits 1 and 0 are for the
 transmission of BPs. They work
 independently of each other and reflect
 the latest status of the transmitted and
 received BPs.



   < 5 >  Switch Error This bit is set if the Boot Buffer switch
 in the Rx direction was unexpected. This
 means that the delimiter received did not
 correspond to the boot buffer pointed to
 by the buffer pointer.



   "Rx Switch" must be set for this bit to be
 valid.



   < 4 >  Rx Buf Num This bit gives the number of the Boot
 Buffer that was just filled by the network
 and needs to be emptied by the CPU. "Rx
 Switch" must be set for this bit to be
 valid.



   < 3 >  Rx Switch This bit is set when there was an Rx Boot
 Buffer switch. This will generate an
 interrupt.



   < 1 >    Tx    Buf Num This bit gives the number of the Boot
 Buffer that was just emptied by the
 network and needs to be filled by the CPU.



   "Tx Switch" must be set for this bit to be
 valid.



   < 0 >  Tx Switch This bit is set when there was a Tx Boot
 Buffer switch. This will generate an
 interrupt.



  Test Command Register
EMI80.1     


<tb> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> Test <SEP> LB <SEP> OFFlin
<tb>  <SEP> CRC <SEP> Delay <SEP> LB <SEP> En
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
Table B-32  
Bits Name Function  < 2 >  Test CRC When set, the CRC generator will induce
 CRC errors. This is used to test the
 system's behavior in the event of a CRC
 error.



   < 1 >  LB Delay When set, the loopback path will not have
 any delay. When reset, the loopback path
 will insert a 4-bit delay.



   < 0 >  OFFlin Lb En This bit is set to enable the OFF-line
 tests that will tie the transmitted data
 to the received data. There are two
 variations of loopback, determined by the
 TM Master/Slave bit. Master LB will
 loopback the entire frame. Slave LB will
 loopback only during the time slots that
 the device is transmitting. This is
 described in more detail in Chapter 4,
 "Maintenance and Diagnostic Commands"
 section.



  RXTX Transmit Status Register
EMI81.1     


<tb> No <SEP> Tx <SEP> Tx <SEP> Tx <SEP> Tx <SEP> Tx <SEP> Tx <SEP> Tx
<tb> Tx <SEP> TM <SEP> SSP <SEP> SP <SEP> BP1 <SEP> BP0 <SEP> CVP <SEP> VP
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-33
A bit is set if the corresponding packet will be sent to the network. "No Tx" is set if there is no transmission or if network pseudo-silence is transmitted (possible only during
Master-loopback mode).



  RXTX Receive Status Register
EMI81.2     


<tb>  <SEP> Junk <SEP> CVP <SEP> Silen. <SEP> SP <SEP> TM <SEP> BP1 <SEP> BP0 <SEP> VP
<tb> Px'd <SEP> Tx'd <SEP> Rx'd <SEP> Rx'd <SEP> Rx'd <SEP> Rx'd <SEP> Rx'd <SEP> Rx'd
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-34
A bit is set (=1) when the corresponding delimiter is detected. Only one of the least significant 5 bits will be set at any time. "CVP Tx'd" is set only when a CVP was transmitted by the same device. The "Junk" and Silen Rx'd"  bits may be set when the "CVP Tx's" bit is set. "Junk Rx'd" is set when anything but the expected delimiter is received.



  This bit tells the PCTL chip to ignore the incoming data.



  Packet Status Register
EMI82.1     


<tb> Frame <SEP> CRC <SEP> CRC
<tb> X <SEP> X <SEP> X <SEP> X <SEP> Error <SEP> X <SEP> MMatch <SEP> Error
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-35
Bits Name Function  < 3 >  Frame Error Set when the Mod 8 frame number in the
 received TM packet changes the Frame
 counter in the RxTx chip by any number
 but one. This error can only be detected
 during slave mode.



   < 1 >  CRC MMatch This bit indicates whether the 16-bit
 CRC received during the previous time
 slot is equivalent to the CRC sent
 (l=Not equivalent or MisMatch). With the
 exception of Timing Marks, this is used
 whenever a device is listening to its own
 transmission. It is, for example, for VPs
 during bit error rate testing (a device
 loops back a time slot for on-line
 diagnostics) and for SPs since a device
 always receives its own SP.



   < O >  CRC Error When set, this bit indicates that the CRC
 is correct based on the packet received
 rather than on a saved CRC value as
 in "CRC" MMatch," above. This is used for
 TMs (slave mode) and SPs.



  Current Channel Register
EMI82.2     


<tb> Tx3 <SEP> Tx2 <SEP> Tx1 <SEP> TX0 <SEP> Rx3 <SEP> Rx2 <SEP> Rx1 <SEP> Rx0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
Table B-36  
Bits Name Function  < 7:4 >  Tx Specifies the current Tx frequency for the
 VP and TM time slots; the frequency may be
 different for the SP time slot. This
 value can be changed by a "Change Channel"
 command in the Active Table.



   < 3:0 >  Rx Specifies the current Rx frequency for the
 VP and TM time slots; the frequency may be
 different for the SP time slot.



   The two frequencies MUST be for the same
 network channel. The RxTx chip does not
 check if this is true; it is up to the
 software to insure this.



   This register is not used in TIMs since
 the Modem cards are shared between several
 TIMs. The Modem cards have a register for
 selecting the Tx and Rx frequencies.

 

  Hash Address Register
EMI83.1     


<tb> CTL1 <SEP> CTL0 <SEP> CRC5 <SEP> CRC4 <SEP> CRC3 <SEP> CRC2 <SEP> CRC1 <SEP> CRC0
<tb>   b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO    <SEP> 
<tb> 
 Table B-37
Bits Name Function  < 7:6 >  CTL Chooses 1 of 4 HASH Table pages  < 5:3 >  CRC Chooses 1 of 8 rows in the HASH Table page  < 2:

  :0 >  CRC Chooses 1 Of 8 bits in the HASH Table
 entry
Interrupt Command Register
EMI83.2     


<tb> Int <SEP> X <SEP> X <SEP> X <SEP> X <SEP> TM <SEP> Mis <SEP> SP <SEP> Err <SEP> lms
<tb> Enable <SEP> Int <SEP> En <SEP> Int <SEP> En <SEP> Int <SEP> En
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
Table B-38  
Bits Name Function  < 7 >  Int Enable Enables all control/interface circuit
 interrupts except for the following which
 requires additional bits to be set.



   < 2 >  TM Mis Int When set, this bit allows interrupts to be
 En generated every time the threshold is
 passed for the number of consecutive TMs
 missed. The "Int Enable" bit must be set
 also.



   < 1 >  SP Err Int When set, this bit enables interrupts for
 En reception of SPs which pass the HASH, but
 have CRC errors. The "Int Enable" bit must
 be set also.



   < 0 >  1 ms Int En When set, this bit enables 1 ms interrupts
 as described in the "lms" bit of the TM
 Status Register. The "Int Enable" bit must
 be set also.



  Reset Command Register
EMI84.1     


<tb> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> Reset
<tb> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-39
Bits Name Function  < 0 >  Reset This bit is cleared after reset and stays
 cleared until the CPU sets it. When
 cleared, the RxTx chip will stay in a
 reset state.



   In the absence of a clock input to the
 RxTx chip, the chip can be reset by first
 writing a 1 then a 0. This sequence will
 hold the chip in reset.  



  Skew Register MSB
EMI85.1     


<tb> Skew <SEP> 8| <SEP> X <SEP>    | <SEP>       X <SEP> ' <SEP> X <SEP> ' <SEP> X <SEP> ' <SEP> X <SEP> I <SEP> X    <SEP> 
<tb>   I    <SEP>    I    <SEP>    I    <SEP>    I    <SEP>    I    <SEP> I <SEP>    I    <SEP> ¯¯
<tb>  <SEP>    b7    <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> bl <SEP> bO
<tb> 
 Table B-40
Skew Register LSB
EMI85.2     


<tb> Skew <SEP> 7 <SEP> Skew <SEP> 6 <SEP> Skew <SEP> 5 <SEP> Skew <SEP> 4 <SEP> Skew <SEP> 3 <SEP> Skew <SEP> 2 <SEP> Skew <SEP> 1 <SEP> Skew <SEP> 0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-41
Bits Name Function  < 7:

  :0 >  Skew The combined bits in both Skew Register
 MSB and Skew Register LSB show the value
 of the skew calculated by the RxTx chip.



  Rx Frame Register
EMI85.3     


<tb> RCyc7 <SEP> RCyc6 <SEP> RCyc5 <SEP> RCyc4 <SEP> RCyc3 <SEP> RCyc2 <SEP> RCyc1 <SEP> RCyc0
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-42
Bits Name Function  < 7:0 >  RCyc These bits show the value of the Rx Cycle
 (FRAME) number. This register will show
 the value of the Rx Cycle number in the
 received TM packet if the TM had no CRC
 errors. If the received TM packet was bad,
 the last Rx Cycle number will be
 incremented.



  Fault Register
EMI85.4     


<tb> Fault <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
Table B-43  
Bits Name Function  < 7 >  Fault This bit can be read to see if the modem
 has generated a fault. A fault will exist
 if the modem has been transmitting for an
 exceedingly long period (i.e. in the order
 of an entire frame.)
 Writing anything to this address will
 generate a fault reset pulse which will
 restart the modem circuitry.



  Oscillator Enable Register
EMI86.1     


<tb> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> X <SEP> osc
<tb> Enable
<tb>  <SEP> b7 <SEP> b6 <SEP> b5 <SEP> b4 <SEP> b3 <SEP> b2 <SEP> b1 <SEP> b0
<tb> 
 Table B-44
Bits Name Function  < 0 >  Osc Enable: When set, this bit enables the modem
 oscillator. It can be read to confirm the
 status.  



  RXTX/PCTL Commands
 Now that the organization of PRAM 82 and the RXTX 90/PCTL 92 internal registers have been described, the various commands between RXTX 90 and PCTL 92 may be described.



   The command number and a short description is stated.



  The data field describes what should appear on the PRAM data bus as a result of the command. The source and destination tells where the data comes from and which devices use it.



     COMMAND    0 (00000):
Description: No operation
Data Field: Don't Care
Source: PD  < 7..0 >  is tri-stated.



  Destination: PD  < 7..0 >  is tri-stated.



  The Commands will be NOPs (Command 0) until the Rx frame is locked (i.e. the TM threshold is reached).



  The following commands are specifically for the transmit or receive direction.



  Commands Issued when   Transmittinq    Data to Modem 70
COMMAND 1 (00001):
Description: Read Tx Active Table for present time slot.



  Data Field: See Table B-9
Source: P-RAM
Destination: RxTx chip and PCTL chip   COMMAND    2 (00010):
DescriPtion: Read Net Tx PCM Timeslot Map Entry. This register maps a network voice time slot to a PCM highway time slot.



  Data Field: See Table B-13
Source: P-RAM  
Destination: PCTL chip   COMMAND    3 (00011): +
Description: Read Net Tx Read Pointer. This register holds
 the Xmt Ring Buffer address which points to the
 first byte to be transmitted in this time slot.



  Data Field: See Table B-8
Source: P-RAM
Destination: PCTL chip   COMMAND    4   (00100):   
Description: Read PCM Hwy Tx Write Pointer. This register holds the first Xmt Ring Buffer address which will be written into by the PCM Hwy during this time slot.



  Data Field: See Table B-7
Source: P-RAM
Destination: PCTL chip   COMMAND    5 (00101):
Description: Read PCTL Transmit Status.



  Data Field: See Table B-15
Source: PCTL chip
Destination: RxTx chip
COMMAND 6   (00110):   
Description: Send RXTX transmit Status to PCTL. The RxTx sends
 status to the PCTL, stating the type of packet that will be transmitted.



  Data Field: See Table B-33
Source: RxTx chip
Destination: PCTL chip   COMMAND    7 (00111):
Description: Transfer appropriate data. This command is used  
 whenever packet data is needed from the P-RAM.



  Data Field: The data byte to be transmitted in the current
 packet.



  Source: P-RAM
Destination: RxTx chip
COMMAND 8 (01000):
Description: Write the first byte of the last time slot's CRC.



  Data Field: Least significant CRC byte.

 

  Source: RxTx chip
Destination: P-RAM (OBCO-OBFF)   CONKAND    9 (01001):
Description: Write the second byte of the last time slot's CRC.



  Data Field: Most significant CRC byte.



  Source: RxTx chip
Destination: P-RAM (OBCO-OBFF)
COMMAND 10 (01010):
Description: Transfer CVP time slot number from RxTx to PCTL.



  Data Field: Least significant 6 bits of the octet is the frame
 bit (forward or reverse) and the 5-bit slot number.



   (Table B-28, bits  < 5:0 > )
Source: RxTx chip
Destination: PCTL chip
CONMAND 11 (01011):   Descrition:    Read Busy/Free table of CVP time slot. The CVP
 Command Byte (see Table B-25) specifies forward
 or reverse frame. The RxTx chip will issue this
 command every frame, but the data field will be used only during the designated frame (forward or
 reverse).



  Data Field: See Table B-ll  
Source: P-RAM
Destination: RxTx chip    ç   
COMMAND 14 (01110):    Os   
Description: Update Network   Tx    Read Pointer
Data Field: See Table B-8
Source: PCTL chip
Destination: P-RAM
ICB Commands for the Rx Direction
COMMAND 16 (10000):
Description: Update Rx Active entry to report Disconnect.



  Data Field: See Table B-10
Source: PCTL
Destination: P-RAM
COMMAND 17 (10001):
Description: Read Rx Active entry for current time slot.



  Data Field: See Table B-10
Source: P-RAM
Destination: RxTx and PCTL chip
COMMAND 18 (10010):
Description: Read Net Rx-PCM Timeslot Map Entry. This register1
 maps a network voice time slot to a PCM highway time   slot.   



  Data Field: See Table B-13
Source: P-RAM
Destination: PCTL chip  
COMMAND 19 (10011):   pescription:    Read Net Rx Write Pointer. This register holds
 the Rcv Ring Buffer address where the first data byte is stored. When issued during a TM or SP time slot, the TM or SP pointer is just cleared since these packets always start at the same buffer address.



  Data Field: See Table B-6
Source: P-RAM
Destination: PCTL chip
COMMAND 20 (10100):
Description: Read PCM Hwy Rx Read Pointer. This register holds
 the first Rcv Ring Buffer address which will be read by the PCM Hwy during this time slot.



  Data Field: See Table B-5
Source: P-RAM
Destination: PCTL chip
COMMAND 21 (10101):
Description: Read PCTL Receive Status
Data Field: See Table B-16
Source: PCTL chip
Destination: RxTx chip
COMMAND 22 (10110):
Description: Send Delimiter Status. The RxTx sends status
 to the PCTL, stating the type of packet that was
 received.



  Data Field: See Table B-34
Source: RxTx chip
Destination: PCTL chip
COMMAND 23 (10111):  
Description: Transfer appropriate data. This command is used
 whenever actual information is sent to the P-RAM.



  Data Field: The data byte received in the current time slot.



  Source: RxTx chip
Destination: P-RAM
COMMAND 24 (11000):
Description: Read the first byte of the last time slot's CRC.



  Data Field: Least significant CRC octet.



  Source: P-RAM (OBCO-OBFF)
Destination: RxTx chip
COMMAND 25 (11001):
Description: Read the second byte of the last time slot's CRC.



  Data Field: Most significant CRC octet.



  Source: P-RAM (OBCO-OBFF)
Destination: RxTx chip
COMMAND 26 (11010):
Description: Read Busy/Free Table Entry of current time slot.



  Data Field: See Table   B-Il   
Source: P-RAM
Destination: PCTL chip
COMMAND 27 (11011):
Description: Update Busy/Free Table Entry of current time slot.



  Data Field: See Table   B-il   
Source: PCTL chip
Destination: P-RAM  
COMMAND 28   (11100):   
Description: Send HASH address to PCTL.



  Data Field: See Table B-37
Source: RxTx chip
Destination: PCTL chip
COMMAND 29   (11101):   
Description: Read HASH table entry.



  Data Field: See Table B-12
Note this byte is used by the PCTL chip only.



  Source: P-RAM
Destination: PCTL chip
COMMAND 30 (11110):
Description: Update Network Rx Write Pointer
Data Field: See Table B-6
Source: PCTL chip
Destination: P-RAM
COMMAND 31 (11111):
Description: Send Packet Status. The RxTx sends status
 to the PCTL, stating any errors detected after the
 entire packet has been received.



  Data Field: See Table B-35
Source: RxTx chip
Destination: PCTL chip
 RXTX/PCTL OPERATION
 In this section it is assumed that multiple channels  are supported, and the terminals coupling RXTX 90 with PCTL 92 are broadly referred to as the interchannel bus (ICB).



  Timing Mark Generation
 Upon initialization, it is necessary to establish system timing. To do this, CPU 72 sets the M/S bit in the   TM   
Master/Slave Register (Table B-22) for each control/interface circuit which CPU 72 desires to be a potential TMG. Each potential TMG waits a random length of time (up to about 50 milliseconds) and then its timing mark state machine transmits
TM packets on all channels.



   In the tables that follow, the time period refers to the current octet on the node input (not the octet on the ICB).



  Also note that the commands in some delimiter time periods are labeled   "early,"      "late,"    or "normal." An "X" means either a 0 command or no command at all is sent (the delimiter or pad time period was curtailed).



     Tx    time slots start during the pad of the previous time slot. At this point, the time slot counters in the RxTx chip and PCTL chip are incremented (using the signal on ync
Terminal 298). The Tx state machine is allowed two commands for every octet. Since all pads except TM pads are 12-bits wide, there can be up to 3 commands during these times.



  Time Period Command Comments
Pad time before (1,2,3) Enable Tx Modem 4 bits timeslot (12 bits) before start of Tx frame.



   Cmds 1-4 automatically
 issued, but they are
 ignored for TMs.



  Send Preamble (4,6) TM master/slave bit (Table, (8 bits) 22) determines if the Tx
 modem is enabled. If
 not, nothing is sent,
 but the command
 sequence continues.



  Send   TM    delimiter (FOh) (7,8) Fetch frame number (8 bits) from an RXTX register.



   CMDs 8  & 9 are for CRC  
 (frame number) checking
 of last time slot. Not
 applicable to first TM.



  Send Frame number (7,9) Start CRC accumulation on (8 bits, data byte 1) Tx'd packet with this
 byte. Fetch first byte
   of TMG    ID information from
 P-RAM TxTM buffer.



  Send TMG ID &num; 1 (7,0) Fetch second byte of TMG (8 bits, data byte 2) ID information from P-RAM
 Tx TM buffer.



  Send TMG ID &num; 2 (7,0) Fetch first byte of boot (8 bits, data byte 3) control information from
 P-RAM   Tx    TM buffer.



  Send Boot Control &num; 1 (7,5) Fetch second byte of boot (8 bits, data byte 4) control information.

 

  Send Boot Control &num;2 (14,0) CMD 14 is issued but is (8 bits, data byte 5) meaningless for TM
 transmission.



  Send CRC (0,0) No command activity while
LSB (8 bits) CRC is sent.



  Send CRC   (o,O)    Save CRC in PRAM CRC
MSB (8 bits) buffer. Turn off TX modem
 at end of CRC.



   If a control/interface circuit 80 receives the TM packet that it sent intact, it assumes the status of master
TMG. The other control/interface circuits clear the M/S bit, assume the status of slave TMGs, and monitor their respective channels to ensure that the master TMG is sending valid TM packets.



   The following is performed when receiving TMs:
Time Period Command Comments
Rx TM Preamble (17,18)   CMD&num;17,18,19,20    are
 automatically issued but
 are ignored by the PCTL
 for TMs.



  Rx TM Delimiter early (19,X)
 normal (19,0)
 late (19,0,X)     Rx Frame Number (20,22) Start CRC accumulation.



  (Data Byte 1) Here, the delimiter   
 status is known. The
 RxTx will continue
 issuing commands
 regardless of whether
 a delimiter is
 detected or not. If not,
 the PCTL will ignore
 data xfer commands (&num;23)
Rx TMG ID Byte &num; 1 (23,21) Write Frame Number into (Data Byte 2) P-RAM   Rx    TM Buffer. Also
 save (at least) 3 lsbs of
 frame in temp register.



   The Frame Number appears
 on the ICB. TM history
 reported (&num; missed  & &num;
 good).



     Rx    TMG ID Byte &num; 2 (23,24) Write TMG ID Byte &num; 1 into
 P-RAM Rx TM Buffer. CMDs
 24  & 25 are issued to
 support CRC checking on
 the last time slot.



     Rx    Boot Control &num; 1 (23,25) Write TMG ID Byte &num; 2 into (Data Byte 4) P-RAM Rx TM Buffer.



     
Rx Boot Control &num; 2 (23,30) Write Boot Control &num; 1 (Data Byte 5) byte into P-RAM Rx TM   
 Buffer. CMD&num;30 is issued
 while the last data byte
 is arriving, but is
 ignored here.



  CRC LSB (23,0) Last TM data byte
 transferred. Write boot
 control &num;2 byte into P
 RAM Rx TM Buffer. The
 Tx'd CRC of previous time
 slot is compared to Rx'd
 CRC (stored in RxTx).



   Results in   CMD&num;31.   



  CRC MSB (0,0)
PAD before early (31,0,X) TM status reported.



  SP slot normal (31,0) The TM has an
 late (31,X) 8-bit pad instead of 12.



   Check Rx'd CRC register
 for zero immediately after
 incoming CRC is shifted
 through. If CRC checks,  
 load receive frame &num; (Mod
 8) into RxTx's Rx Frame
 Register. Set "TM Rx'd"
 bit in RXTX Receive Status
 Register if slave mode is
 selected, and increment
 consecuive Rx Valid TM
 register. If CRC is bad,
 increment Rx Frame
 register and increment RX
 TM CRC error register.



   If this TM is received  < 
 1 ms after the previous
 TM, set Multi-TMs and TM
 Int bit in TM status
 register. If no TM was
 detected at all, increment
 missing RXTM register and
 consecutive missing RXTM
 register, and set pending
 interrupt in TM Status
 register if missing TM
 threshold has been
 reached. If a good TM was
 received but the frame
 count is out-of-sequence,
 increment TM out-of
 sequence register.



   In the event that TM packets on any channels stop for some number of consecutive frames (as determined by the
Threshold register (Table   B-18)    and the Consecutive Missing TM register), the backup TMGs arbitrate to become the new master
TMG.



   Since the TM is much smaller than the other packets,
CMDs &num;26, 27, 16, 28,  & 29 are not issued.



  Receive Frame Timing
 Once the master TMG is established, each control/interface circuit 80 must establish proper receive and transmit frame timing. This is done by first capturing and locking into the incoming TM packets. Both master and slave
TMGs perform this function. After coming out of reset or after the TM window bit in TM Command/Lock Status register (Table B23) is set to zero by CPU 72, RXTX 90 will begin searching  continuously (i.e. the search window is "wide open") for good
TM packets. During this time, no other packets are recognized.



  It is possible to detect several good TM packets within a millisecond, since there may be different devices arbitrating to become the master TMG. Errors will be recorded to prevent a false lock. Once a steady stream of   TM    packets is detected with   TN    packets spaced about a millisecond apart, with good
CRCs and good frame numbers, RXTX 90 will lock the incoming frame by setting the TM Window bit to one. This means that
RXTX 90 will search for TM packet delimiters during a small window at a predicted time (every millisecond). This leaves the rest of the frame for servicing other packets, and RXTX 90 can function normally. Furthermore, looking for TMs only when they are expected prevents occasional voice data which mimic
TMs with valid CRCs from causing receiver synchronization malfunction.



   CPU 72 sets the "TM lock threshhold" in the TM command register (see Table B-23) to determine how many consecutive good   TN    packets must be detected before the frame is locked. RXTX 90 will lock the frame automatically when this threshhold is reached. If the chosen threshhold is too long,
CPU 72 can lock the frame manually by setting the TM Window bit to one. In this embodiment, RXTX 90 cannot automatically declare loss of frame and open the search window by itself to reestablish it. Even if several frames have passed without good   TM    packets, RXTX 90 must continue to predict frame boundaries until the device is reset or CPU 72 gives an explicit command to open the window.



   After the TM lock threshhold is reached, the receive frame is established upon reception of the next good TM packet.



  After checking the CRC of the incoming TM packet and determining that the packet is free of errors, RXTX 90 counts the number of bits of the TM pad time and creates a bit-wide pulse during the last bit of the TM pad. See Fig.   B-5.    A number of bits in an SP is then counted, and the first voice time slot is marked by a pulse. This continues until the next  
TM time slot where the pulse is lengthened to 8 bits to mark the beginning of a new frame. Once the receive frame is locked, the receive frame time pulses are meaningful. These timing pulses are shared with PCTL 92 (via RXS terminal 282) and allows control/interface circuit 80 to receive information within distinct time slot boundaries.



   In this embodiment, if the TM packet received has a
CRC error, the beginning of the SP time slot is determined from the last good TM packet. That is, RXTX 90 continues predicting time slot boundaries even if the TM packet is bad. A separate signal indicates whether the present frame is forward or reverse. This is determined by the LSB of the received frame number of a good TM packet (in this embodiment, if the TM packet is bad, the signal is toggled). This signal will be valid after the TM CRC is checked for the SP time slot.



   The pulses of the receive frame signals mark the predicted time of arrival of a preamble. In actuality, a packet may arrive four bits earlier or later (because of reclocking by HRU 50). Because of this, a 16-bit window is established in which the delimiter may be found. See Fig. B-6.

 

  A delimiter that lies partly or wholly outside this window must be ignored so that neighboring time slots are not affected.



  After the receive frame is locked, the TM and VP slots use 16bit windows. The SP slots use 16-bit windows also unless the
SSP is expected. The pulse for the next time slot does not change if a delimiter of the current time slot is early or late. This is because the source of transmission of the next time slot is independent. The shift in timing caused by an early or late delimiter is absorbed by the preamble or the pad (one or the other is shortened).



  Skew Calculation
 As explained in the discussion of Network Timing, the
Tx frame must start a skew time before the Rx frame.



  Therefore, before Tx frame timing may be established, skew must be calculated. This is done by transmitting and receiving a  skew signalling packet (SSP). The skew is represented by the number of bit times (of the 5.018 Mhz clock) it takes for the round trip delay. To account for skew variations during operation, skew for a particular device is recalculated   t    every time it sends an SP.



   A Signalling Packet is sent out during the SP timeslot, according to the SP Space and   Tx    Channel bits of the command. In addition, this transmitted packet is received and the CRCs of each are calculated and compared to detect collisions. An interrupt is given after this receive check is performed giving the results. The hardware clears the command after the packet is transmitted to ensure the same packet is not transmitted again.



   All SPs transmitted are either 14 bytes long or 60 bytes long from the end of the delimiter to the start of the CRC (i.e. control/interface circuit 80 always transmits one of these lengths). The short packets are used to set the skew so that they do not interfere with the first voice times lot if the actual skew of the control/interface circuit is great. The maximum length packets are used at all times thereafter.



   A new skew calculation is performed whenever a Tx SP command is given by CPU 72. The new value is only accepted by control/interface circuit 80 if the SP was received correctly.



   The command sequence is generally the same for SPs and SSPs so both will be described now. RxTx 90, however, will generate and send a CRC after the 14th byte of an SSP.



  The Tx modem will be disabled after the CRCs are sent, but the command sequence will continue as if a regular SP is being processed. All commands issued after the SSPs CRC are ignored.



   Since different types of SPs may have different priorities, SPs are placed in eight different partitions in this embodiment. The partitions are determined by a modulo eight frame counter (modulo four cycle counter) transmitted by the master TMG. CPU 72 specifies, via the SP command register,  in which one or more of the eight partitions it can be sent.



  RXTX 90 then transmits the SP on the next allowable frame.



  This partitioning scheme is simple enough to be implemented in hardware, thus freeing CPU 70 for more important tasks.



  Time Period Command Comments
Channel Change Pad (0,0) Re-tune Tx frequency time (3 bytes) synthesizer to transmit
 channel specified in Tx
 SP command register LSB.



  Pad time before SP (0,0,0,1,2,3) Inspect both SP command (12 bits) Registers (MSB and LSB)
 If command pending, check
 Spbits to see if it can
 beXmt'd this frame. If
 so, set flags to tell
 Rxstate machine that an
 SPis being sent this
 frame,and its length
 (short orlong). Then
 enable TxModem 4 bits
 before transmission is
 tobegin. If no SP is to
 betransmitted this
 frame,no furthur   Tx   
 SPprocessing is
 required.Cmds 1-4 are
 ignored forSPs.



  Send Preamble (4,6) Clear CMD bits of SP (8 bits) command register, making
 it inactive so it is not
 executed again. The SP
 Command Regs determine   d   
 the Tx modem is enabled.



   If not, nothing is sent,
 but the command sequence
 continues.



  Send SP Delimiter (7,8) Read first byte of SP from (CCh) (8 bits) Tx SP buffer (assumed to
 be LSB of destination
 address). CMDs 8 &  are for
 CRC checking of previous
 time slot.



  Send SP Data bytes Read next byte to be (14 total if SSP, 60 transmitted during the total if normal SP) transmission of the
 previous byte.  



  Data Byte 1 (7,9) Start accumulating CRC on (Destination address LSB) destination address LSB.



   Also start Skew Counter
 as first data bit is
 shifted out to the
 network.



  Data Bytes 2-58 (7,0) or 2-13
Data Byte 14 or 59 (7,5)
Data Byte 60 (14,0) CMD 14 is issued but is or 14 meaningless for SP
 transmission.



  Send CRC (2 bytes) (10,11,   o,      o)      Savevalue of CRC register   
 in PRAM for use by Receive
 State machine in doing
 collision detection.



   Turn off Tx Modem at end
 of CRC. CVP processing
 (CMD 10, 11) takes place
 but is meaningful only if
 there is a CVP command and
 if the frame is correct
 (fwd or rev). See the
 command sequence for CVPs.



  Idle Time (SSPs only - up to 46 bytes) (0,0)
Channel Change Pad (0,0,0,0,0,0) Re-tune Tx frequency (3 bytes) Synthesizer to normal
 transmit frequency as
 specified in RxTx
 register.



   Control/interface circuit 80 will receive any SP sent on the channel to which it is listening, except when that control/interface circuit is transmitting an SP on another channel during that frame.



   The receive sequence for SPs and SSPs are the same except for the length of the data byte field. The RxTx will know if it had just sent an SSP because it will have set the TX
SSP bit in the SP Status Register. Since the SSP is much smaller in length than an SP, it may be received in a much larger window during the SP time slot. Because of this, there  may be a long sequence of NOPs (Command 0) when waiting for the arrival of an SSP packet.



  Time Period Command Comments
Channel Change (0,0,0,0,0,0) No ICB activity. RxTx 90 (3 bytes) is changing channels.



  Rx SP Preamble time (17,18) Active and timeslot map
 regs are read but ignored
 for SPs.



     Rx    SP Delimiter early   (l9,X)    time normal (19,0)
 late (19,0,X)    very late (19,0, ,0,X) For SSPs ONLY.   



   Send CMD 0's until delim
 is found or until window
 is closed.

 

  Rx SP Dest. Address (20,22) CMD &num;20 is ignored for (Data Byte 1) SPs. Here the delimiter
 status is known. The
 RxTxwill continue issuing
 commands regardless of
 whether a delimiter is
 detected or not. If not,
 the PCTL will ignore
   CMD&num;23.    Start accumulating
 Rx CRC with this byte,
 which is the least
 significant byte of the
 destination address.



   Read "SP BF Buffer Status
 Register Full" bit. If
 full, do not transfer any
 bytes of incoming SP to
 the Rx SP Buffer and stop
 processing. Increment
 missed RXSP count bits if
 address hash passes.



  Rx SP Dest. Address (23,26) Write LSB of destination (Data Byte 2) address to Rx SP Buffer 
 increment pointer into P
 RAM. The first Data byte
 appears on the ICB. CMDs
 26 and 27 are ignored for
 SPs.



  Rx SP Control Field (23,27) Write 2nd LSB of Address (Data Byte 3) to Rx SP Buffer   
 increment pointer.



   Latch bits  < 0:5 >  of Rx CRC
 calculation after first
 4 bits of Control byte
 shifted into CRC checker.



  SP Data byte 4 (23,16) Write SP Control Field   remainder    of physical to Rx SP Buffer address treated as Data increment pointer. CMD by hardware.] 16 is ignored.



  Data Byte 5 (23,28) After 3 data bytes
 (2 address, 1 control)
 is known, the address
 HASH is calculated
Data Byte 6 (23,29) Using first bits of
 control field concatenated
 with bits  < 0:2 >  of latched
 CRC as the address into
 the P-RAM resident hash
 table (PA < 4:3 > ), read
 appropriate byte.



   Use bits  < 3:5 >  to select
 a single bit in the Hash
 Table entry (PA < 2:0 > ).



   If this bit is set, the
 packet has passed the
 address hash. Terminate
   Rx    SP processing if
 address hash does not
 pass.



  Data Byte 7 (23,21) Here, the HASH results
 are reported. The RxTx
 continues to issue
 commands regardless of
 whether the HASH is
 passed or not.



  Data Byte 8 (23,24) The Tx'd SP CRC is
 compared with the Rx'd
 CRC (stored in RxTx).



  Data Byte 9 (23,25)
Data Bytes 10-59 (23,0) or DBs 10-13 for SSPs
Data Byte 60 (23,30) CMD&num;30 is issued while or DB 14 for SSPs the last data byte is
 arriving, but is  
 ignored for SPs.



  CRC LSB (23,0) Place data byte 60 into
 Rx SP buffer.



  CRC MSB (0,0)
Idle time (SSP ONLY) (0,0) Depending on when an SSP (up to 46 bytes) is rx'd, there may be
 idle time.



  Channel Change (31,0,0,0,0,0) Packet status is (3 bytes) reported. RxTx is
 changing channels.



  PAD time before VTS early (0,0,X) If CRC checks (i.e. Rx CRC
 normal (0,0)   calc.    equals zero after
 late (0,X) received CRC shifted
 through), set the "SP BF
 Full" bit, the Rx Good bit
 in the SP status register,
 and set the SP interrupt
 bit. If CRC does not
 check, set the CRC MMatch
 bit and increment the RxSP
 CRC Error register and
 generate an interrupt if
 enabled. Update the skew
 registers (MSB and LSB)
 with the skew value.



   Changes in skew values will not generate interrupts to the CPU. The skew registers however, can be read by the
CPU, in case variations need to be monitored.



  Transmit Frame Timing
 In this embodiment, the   Tx    frame is generated two different ways depending on whether control/interface circuit 80 is a master TMG or a slave. For a slave, the start of the   Tx    frame depends on when the TM was received and the length of the skew. For a master, the Tx and the Rx frames are independent.



   Slave Mode. Slaves are all control/interface circuits except for the device that is a master TMG. As noted above, the Tx frame must start a skew time before the Rx frame.  



  However, the control/interface circuit needs to know the beginning of the Rx frame to establish the beginning of the   Tx    frame. One way to circumvent this dilemma is to establish the beginning of the next
Tx frame.



   Each   Rx    frame is given a frame number by the master TMG.



  The Rx frame with frame number N will establish the beginning of the Tx frame with frame number   N+1    (See Fig. B-7). The beginning of the TX frame is determined by counting down from a fixed point in the Rx frame until this counter equals the skew count register. This fixed point must be far enough from the end of the Rx frame so that the maximum possible skew that the system will tolerate can be supported. This point is thus called the maximum skew point or MSP.



   The time slot boundaries of the Tx frame are slightly different from that of the Rx frame. Instead of starting during the last bit of the previous packet's pad time, the pulse occurs at the beginning of the pad time. This allows RxTx 90 to prepare for data transmission well before the upcoming preamble (See Fig. B-8).



   Master Mode. If a control/interface circuit is the
Master TMG or if it is contending to become the TMG (during power up or the loss of the Master TMG), the start of the Tx frame is independent of the Rx frame. The start of the   Tx    frame is dependent, however, to the start of the   Tx    frame of other
TMGs in the system. The control/interface circuits can work by themselves, but in this embodiment, all TMGs are synchronized (via the C-M/S bit in the TM Command/Lock Status register (Table B-23) and SYNC terminal 298) so that transmissions of TMs occur simultaneously.



   The pulses for the Tx frame during Master Mode is the same as for Slave Mode. That is, the beginning of a time slot is marked by a pulse at the beginning ofa previous time slot's pad time.



   Notice that the   Rx    timing differs from   Tx    timing in  that Rx time slot boundaries are predicted values. Frame boundaries are aligned after receiving a good TM, but since each time slot contain information from varied sources, the first byte of the packet, the preamble, may actually appear 4 bits earlier or later than the predicted time slot boundary.



  (The theoretical limit for error is plus or minus 2 bits, but the RxTx chip will accept up to plus or minus 4 bits of error).



   Because of this discrepancy, it cannot be guaranteed that there will be a total of four commands during the preamble/delimiter time. Worst case, a time slot can receive a packet 4 bits earlier than predicted. Since the time slot counter changes at the predicted preamble time, half of the preamble time will have already passed if a packet comes early. This, effectively, allows for only one command during the preamble time. If the preamble is late by (worst case) 4 bits, there may be up to three commands during the preamble.



   Since it is not known whether a packet is early or late until the delimiter is detected, this discrepancy is taken care of during the delimiter window. Two ICB commands will be sent during the predicted preamble time, but during the delimiter time one, two or three commands are sent depending on whether the packet is early, on time or late, respectively.

 

   The PAD is affected also. If the packet is late the pad time is shortened; hence, there may be only two commands instead of three during the 12 bit pad of voice time slots and only one command instead of two for the 8-bit pads of TM and SP time slots. If the packet is early, the pad time is lengthened; hence, there may be up to four commands during voice time slot
PADs and up to three for   TM    and SP PADs.



  Other Network Commands
 After the appropriate timing parameters have been established, normal command processing may take place. A more detailed description of the other network commands and how they are processed using the RXTX/PCTL commands shall now be described.  



   Transmit Claiming Voice Packet (Tx CVP) - The CVP command register is used to determine if there will be CVP transmission in the present time slot. The command instructs control/interface circuit 80 to send a single VP out on the selected VP timeslot and check the transmission coming back to detect collisions. If this one shot packet is transmitted and received with no errors, this unit has successfully claimed the selected VP timeslot, and can set up a normal Tx VP command. If not, the unit can try to claim another timeslot.



   The control/interface circuit checks the selected VP timeslot's busy/free table entry before sending the CVP (during
SP processing) to eliminate race conditions on a claim. If it is found to be already busy, the control/interface circuit inhibits the CVP transmission, sets a status bit, and reports this condition via an interrupt. If the claim was actually sent, the busy/free entry is left free. This allows units involved in   cVP    collisions to arbitrate between themselves for the timeslot. Other units will not be able to claim the slot as their busy/free tables will indicate that the times lot is busy. This feature is especially useful for multiple responders.



  Time Period Command Comments
Pad time before each VTS (1,2,3) Check CVP command register
 to see if a claim is to
 be made this timeslot; if
 so, CMDL is ignored.



   (Claim over-rides normal
 voice transmission). Read
 Busy/Free table entry for
 this timeslot during SP
 command processing.   14   
 the times lot is already
 busy (Busy/Free entry is
 not above threshold), set
 the Block and CVP Int bit
 in the CVP status register
 to inhibit transmission
 of claiming VP. If the
 timeslot is free, enable
 TX Modem 4 bit times
 before start of preamble.  



   Also clear the CMD bits
 to prevent the CVP from
 being sent again next
 cycle.



  Claim VP Preamble (4,6) Send Preamble.



  Claim VP Delimiter (7,8) Send VP Delimiter.



  (33h) Read byte number
 1 of TX CVP buffer.



   CMDs 8  & 9 are for CRC
 checking of previous
 time slot.



  Send Data Byte 1 - 16 Start CRC accumulation on of claim VP first data byte. During
 each data byte from 1 
 15, read next byte to be
 Tx'd from Tx CVP buffer.



  Data Byte 1 (7,9)
Data Bytes 2-14 (7,0) Transfer remaining data
 bytes.



  Data Byte 15 (7,5) Check PCTL transmit
 status.



  Data Byte 16 (14,X) Write new Net Tx Rd
Pointer back to PRAM. Save
CRC computed on data
 bytes 1 - 16 until next
 PAD, at which time
 it will be written to P
 RAM.



   The results of CRC checking are not known until the following time slot since the CRC matching is done then. RxTx 90 needs to remember the transmit time slot to send the CVP (n) and the receive time slot to check it (n+l). If the CVP is transmitted, it is received and its status reported with an interrupt. The possible conditions are successful claim (Rx'd packet matched Tx'd packet), collision detected, or nothing detected.



   Transmit Voice Packet (Tx VP) - This command, given  via the Tx Active Table entry for the selected voice timeslot, instructs control/interface circuit 80 to transmit 16 bytes of voice data onto the network during this timeslot each cycle.



  It gets this voice data from the P-RAM via PCTL 92, which has been previously set up by CPU 72 to deliver data from the correct PCM Highway timeslot or tone buffer.



   This command is not used until the selected voice timeslot has been successfully claimed, hence there is no need to check for collisions. For maintenance reasons, however, a
CRC will be computed on both the transmitted and received 16 byte data field. These values will be compared for each transmission, and any error will be logged in the Tx Packet Bit error register.



  Time Period Command Comments
Pad time before each (1,2,3) Store calculated
VTS Tx CRC of packet sent in
 previous timeslot (in P
 RAM) in case required by
 Rx State Machine for Tx
 and Rx comparison (e.g.



   SP, CVP). Read Active
 table and prepare
 pointers. The Tx modem
 is enabled 4 bits before
 the start of the
 preambleif active. If
 not, nothing is sent, but
 the command sequence
 continues.



   If channel change bit
 set,load new Tx modem
 channel into   current   
 channel register and dp
 notallow a transmit this
 slot.   *   
VP Preamble (4,6) Send Preamble. Also, get
 Net Rd pointer for PCM
 Highway times lot transmit
 ring buffer in P-RAM.



   If the active/idle bit in
 mapping register indicates   
 silence be sent, send   ch    from Tx Silence
 buffer instead of from
 transmit ring buffer.



  VP Delimiter (7,8) Send VP Delimiter. Get (33h) the first data byte from
 the P-RAM using Net
 Transmit Read Pointer.



   Increment this pointer (only inside PCTL).



  VP Data Byte 1 - 15 Send VP Data. During
 transmit of byte N, fetch
 byte N+1 from PRAM, and
 increment pointer inside
 PCTL. Compute CRC
 on data bytes.



  Data Byte 1 (7,9) CMDs 8 &  are for CRC
 checking of previous
 time slot.



  Data Bytes 2-14 (7,0) Transfer remaining data
 bytes.



  Data Byte 15 (7,5) Check PCTL status.



  Data Byte 16 (14,X) Send VP Data. Write new
 Net Tx Rd Pointer back to
 PRAM. Save CRC computed
 on data bytes 1 - 16 until
 next PAD, at which time
 it will be written to
 PRAM.



   Receive Voice Packet   (Rx    VP) - This command, given in the Receive Active Table entry for the selected timeslot, instructs RxTx 90 to receive incoming packets during this timeslot and transfer them to P-RAM 82 under control of
PCTL 92. PCTL 92 has been previously set up by CPU 72 (through P-RAM) to deliver data to the correct PCM Highway timeslot receive ring buffer.



  Time Period Command Comments
Rx VP Preamble (17,18) Read Receive Active Table [or TM preamble, entry for this VTS. If if last VTS] timeslot is not active,
 continue processing only  
 until busy/free table up
 date is performed. If a
 CVP was sent during this
 Tx timeslot, perform
 sequence and   busy/free   
 update specified under   Tx   
   cVP    command.



  Rx VP Delimiter early (19,X)
 normal (19,0)
 late   (l9,0,X)   
Rx VP Data Byte 1 (20,22) If anything but silence
 is recognized, clear
 busy/free to zero and
 write this byte back to
 P-RAM. If only silence
 is recognized by the time
 data byte 1 should be
 shifted into RxTx, add one
 to busy/free byte (unless
 already 255), and write
 back to P-RAM. If Rx
 active table entry
 indicates voice or boot
 is active, and the
 busy/free entry has just
 passed its "free"
 threshold as set in the
 threshold register, set
 the disconnect bit in the
 PCTL Receive status
 register and clear the
 active bits in the   Rx   
 active byte. Also write
 this byte back to the Rx
 Active table and set the
 Disc and VP Int bits in
 the VP status register.

 

   Start CRC calculation on
 this byte.



   Here, the delimiter
 status is known. The
 RxTx will continue
 issuing commands
 regardless of whether
 a delimiter is
 detected or not. If not,
 the PCTL will ignore
 CMD&num;23 below.



  Rx VP Data Byte 2 - >  16 During reception of byte
 N, write byte N-l to  
 Receive ring buffer in
 P-RAM and then incre
 ment Net Rx Write Pointer
 as stored in PCTL.



  Rx Data Byte 2 (23,26) The first data byte
 appears on the ICB.



  Data Byte 3 (23,27) B/F and active table
 commands issued to
 PCTL chip. If a
 delimiter is found, the
 B/F=busy except for
 CVPs. For CVPs,
 B/F=free until the VPs
 are rx'd in the time
 slot.



  Data Byte 4 (23,16)
Data Byte 5 (23,28) The HASH commands are
 issued but results
 are ignored.



  Data Byte 6 (23,29)
Data Byte 7 (23,21)
Data Byte 8 (23,24) If Tx VP CRC checking
 is enabled for last
 timeslot, read CRC
 calculated on Tx'd VPfor
 that time slot. Compare
 to Rx CRC calculated on
 last Rx'dVP (stored in
 RxTx temp. register). If
 these do not match,
 increment the Tx Packet
 Bit Error Register.



  Data Byte 9 (23,25)
Data Bytes 10-15 (23,0)
Data Byte 16 (23,30) Write pointer updated
 while last DB is still
 arriving.



  PAD before next TX early (23,31,0,X) Write byte 16 to Receive
 normal (23,31,0) ring buffer and increment
 late   (23,31,X)    pointer stored in PCTL.



   Write new Net Rx Write
 Pointer back to P-RAM.



   Save Rx'd CRC calculated  
 on data bytes of this VP
 in temporary register for
 use during next timeslot
 to recognize VP CRC
 errors. Store O if no
 packet was Rx'd - i.e. not
 VP delimiter was detected.



   This ensures the TX Packet
 Bit error register records
 a bit error in the
 delimiter
 Transmit Boot Packet (Tx BP) - This command, given via the Transmit Active Table entry for the selected voice timeslot (and enabled via a boot mode bit), instructs control/interface circuit 80 to send the next 16 bytes of the currently selected boot buffer (0 or 1) out during this timeslot, using the corresponding boot delimiter. If this 16 bytes completes the buffer, control/interface circuit 80 will automatically switch to the other buffer, set status bits, and interrupt the CPU.



  Time Period Command Comments
Pad time before each (1,2,3) If boot bit in table is
VTS set and boot mode is
 enabled, enable Tx modem
 4 bits before the
 beginning of the preamble.



   If not, it is disabled,
 but the command sequence
 continues. CMD&num;2  & 3 are
 ignored.



  BP Preamble (5,6) CMD&num;5 is issued instead
 of 4 to get current boot
 buffer from the PCTL
 transmit status register.



   This decides then
 delimiter.



  BP Delimiter (7,8) Send delimiter of current (FCh or 03h depending boot buffer in use   (O    or on the boot buffer used) 1) as indicated by the
 CUR buffer bit. Read next
 boot data byte to be sent
 from current boot
 bufferusing the transmit  
 boot pointer register.



   Increment boot pointer.



  BP Data byte 1 - 15 Send boot data byte. Read
 next boot data to be sent
 and increment boot pointer
 in PCTL.



  Data Byte 1 (7,9) CMDs 8 &  are for CRC
 checking of previous
 time slot.



  Data Bytes 2-14 (7,0) Transfer remaining data
 bytes.



  Data Byte 15 (7,5) Check PCTL status.



  BP Data byte 16 (14,X) Send boot data byte. If
 boot pointer has rolled
 around to O (from 255),
 toggle current boot
 buffer bit, set boot
 switch and empty buffer
 bits. Set the TX switch,
 Tx Buf Num and BP Int bits
 in the BP status register
 to generate an interrupt.



   Receive Boot Packet (Rx BP) 
 The following is performed for a Rx BP command by the Receive State Machines.



  Time Period Command Comments
Rx BP Preamble (17,18)
Rx BP Delimiter early (19,X)
 normal (19,0)
 late (l9,0,X)
Rx BP Data Byte 1 (20,22) Here, the delimiter status
 is known. The RxTx will
 continue issuing commands
 regardless of whether a
 delimiter is detected or
 not. If not, the PCTl
 will ignore CMD &num;23.



   If boot delimiter type
 matches current Rx boot
 buffer in use,leave  
 current boot pointer
 intact. If the new
 delimiter is different,
 toggle the current booty
 buffer bit, and reset the
 receive boot pointer   t   
 0.



  Rx BP Data Byte 2 - >  16 While BP data byte N is
 being Rx'd, write BP byte
   N-l    to the current boot
 buffer in P-RAM. Increment
 boot pointer in PCTL.



  Data Byte 2 (23-30) The first data byte
 appears on the ICB.



  Data Byte 3 (23,27)
Data Byte 4 (23,16)
Data Byte 5 (23,28) The HASH commands are
 issued but results
 are ignored.



  Data Byte 6 (23,29)
Data Byte 7 (23,21)
Data Byte 8 (23,24) The Tx'd CRC of previous
 time slot is compared to
 Rx'd CRC (stored in
 RxTx). Results in   CMD&num;31   
Data Byte 9 (23,25)
Data Bytes 10-15 (23,0)
Data Byte 16 (23,30) Write pointer updated
 while last DB is still
 arriving.



  PAD before next early (23,31,0,X) Write BP byte 16 to
VTS normal (23,31,0) current boot buffer.



   late (23,31,X) Increment boot pointer,
 modulo 256. If carry out
 occurs, toggle current
 boot buffer bit and set
 an interrupt pending, with
 status indicating buffer
 was filled when switch
 occurred. Also latch boot
 buffer number (0/1) before
 the switch so that  
 software knows which
 buffer to process.



   Transmit Silence (Tx Silence) - This command is implemented via a normal Tx VP command, combined with the active/idle bit in P-RAM's Network Transmit -PCM Timeslot Map
Entry for the timeslot.



  Packet Controller - PCM   Highway    Commands
 This section briefly describes the operation of the
Codec State Machine process. The Codec State Machine is responsible for the following:
 - Buffering Voice and/or Tone data from/to the codec bus to/from the network for each of the 24 codec bus timeslots.



   - Sending tones to codec bus times lots and network timeslots from P-RAM 82. These tone patterns are written by
CPU 72 before initiating the tone, and are read out continuously by the codec state machine to the desired   timesiots.   



   - Gain level switching of voice and tones toward the codec bus. Voice data from the network and tones destined for the codec bus can be attenuated or amplified as desired via a digital pad controlled by the codec state machine. CPU 72 writes the 256 byte-long PCM translation table into P-RAM 82, and when commanded, the codec state machine will use each voice or tone sample as an address into this table, and send the contents of that location to the codec bus.



   - Codec Bus Control. The codec state machine provides the transmit and receive enables to control a codec (or SPU) on the codec bus. The timeslot(s) at which it is enabled is programmable by CPU 72 via P-RAM 82. Additionally, the codec state machine provides the enables which allow its PCTL chip to transmit on the codec bus. These are also set by  
CPU 72 via P-RAM 82.



   The codec state machine (hereafter called CSM for short) is a time division multiplexed state machine. It performs operations for each of 24 codec bus timeslots. All of the   CSM's    commands, data ring buffers, ring buffer read and write pointers, tones, tone pointers, and gain tables are stored in P-RAM 82. All software commands and associated data (such as tones and gain tables) are written into P-RAM 82 directly, as P-RAM 82 is dual-ported between PCTL 92 chip and
CPU 72. All required arbitration logic is in PCTL 92. In addition, various status information can be accessed by CPU 72 via P-RAM 82.



   The CSM executes a set of actions for each codec bus timeslot. The machine reads a control byte from P-RAM 82 at the beginning of each codec bus timeslot. This byte tells the CSM which actions should be performed for this timeslot in both the receive (to codec) and transmit (toward network) directions, as well as which codec enables, if any, should be given.

 

   The following describes each of the data transfer modes the CSM will support, and gives explanations of each mode. As noted above, PCTL 92 operates on PCM data coded in the mu-255 standard. Hence, the value commonly referred to as "zero" in sign-magnitude is coded as FFh for PCTL 92.



  Likewise, negative full-scale is coded as OOh, while positive full-scale is coded as 80h.



  Receive PCM Highway Commands (to codecs)
Idle
 If Idle mode is selected for a given timeslot, the CSM performs no data transfer operations. This mode should be selected for every unused receive codec bus timeslot.



  Receive Voice with Gain Switching
 This mode is selected for normal voice transfer from an  incoming network timeslot to a PCM Hwy Rx timeslot. The CSM performs the following operations:
 1. Read Receive (from Network) ring buffer read and write pointers from P-RAM 82.



   2. Read a byte from the Receive ring buffer, performing required checks for under or overflow.



   3. Update Receive ring buffer read pointer information to P-RAM 82.



   4. Read location of gain table for this codec timeslot from P-RAM 82.



   5. Send byte read from Receive ring buffer through gain table (use it as address into the 256 byte gain table).



   6. Send result of this read operation to codec bus (if enabled).



  Receive Tone with Gain Switching
 This mode is selected for sending a short tone (less than 256 samples per cycle) to a PCM Hwy Rx timeslot.



   This mode can be used in conjuction with a Transmit PCM
Hwy command to generate a tone to the network only by filling the gain table with zeros   (OFFh),    thus sending silence to the codec bus.



   The CSM performs the following operations:
 1. Read page number (256 byte block in P-RAM) of tone buffer.



   2. Read current offset into tone buffer.



   3. Read next tone sample to be sent out, using the previous two bytes as address into P-RAM 82.



   4. If tone sample is negative full-scale value (deemed illegal), make tone sample = OFFh and write tone offset back into P-RAM as 0. Otherwise, keep tone sample as read, add 1 to offset and write this value back to P-RAM 82.



   5. Read location of gain table for this codec timeslot from P-RAM.  



   6. Send tone sample through gain table (use it as address into the 256 byte gain table).



   7. Send result of this read operation to the codec bus (if enabled).



  Receive   Long tone    without Gain Switching
 This mode supports tones with cycles longer than 256 bytes, but it does not perform gain switching. The CSM performs the following actions:
 1. Read current tone page number from P-RAM 82.



   2. Read current tone offset in page from P-RAM 82.



   3. Read tone sample from P-RAM 82 using above bytes as address.



   4. Read beginning tone page number from P-RAM 82.



   5. If tone sample is negative full-scale value deemed illegal), make tone sample = OFFh, write current tone offset back into P-RAM as 0, and write beginning tone page number back to P-RAM as current tone page number. Otherwise, keep tone sample as read, add one to 14 bit quantity current tone page and offset, and write the resulting least significant 8 bits back as current tone offset, most significant 6 bits as current tone page number.



   6. Send tone sample to codec bus (if enabled).



  Receive Short Tone - Terminate this Cvcle
 This command is identical to the Receive Tone with Gain
Switching command except that it will not start another cycle through the tone buffer. It remains at the end of the current tone buffer, constantly reading out the last (illegal) value and sending silence to the Codecs. CPU 72 uses this command to transition between normal tone generation and idle state.



   After software switches from a Receive Tone with Gain
Switching to this command, it should allow PCTL 92 to finish the current tone cycle before starting another tone or switching to idle. CPU 72 can deduce that the cycle is completed by reading the tone offset pointer in P-RAM 82 a few  times and noticing it is at the terminal value (multiple reads are performed to guard against the case where the
Terminate this Cycle command is given just after the command word is read for the last tone sample in the cycle. For a short time the terminal value is in the tone offset pointer, but since PCTL 92 is executing a previous command, it will wrap around to zero).



   An alternate method is to simply wait 32 milliseconds after issuing the Terminate this Cycle command - this is the longest it could take to finish a 256 byte tone pattern.



   The CSM performs the following operations:
 1. Read the page number (256 byte block in P-RAM 82) of the tone buffer.



   2. Read current offset into tone buffer.



   3. Read next tone sample to be sent out, using the previous two bytes as address into P-RAM 82.



   4. If the tone sample is negative full-scale value (deemed illegal), make tone sample = OFFh and DO NOT write the tone offset back into P-RAM 82. Otherwise, keep tone sample as read, add 1 to the offset and write this value back to P-RAM 82.



   5. Read location of gain table for this codec timeslot from P-RAM 82.



   6. Send tone sample through gain table (use it as an address into the 256 byte gain table).



   7. Send the result of this read operation to the codec bus (if enabled).



  Receive   Lona Tone    - Terminate this Cycle
 This command is identical to the Receive Long Tone without Gain Switching command except that it will not start another cycle through the tone buffer. It remains at the end of the current tone buffer, constantly reading out the last (illegal) value and sending silence to the Codecs. The CSM performs the following actions:
 1. Read current tone page number from P-RAM 82.  



   2. Read current tone offset in page from P-RAM 82.



   3. Read tone sample from P-RAM 82 using the above bytes as the address.



   4. Read the beginning tone page number from P-RAM 82.



   5. If the tone sample is negative full-scale value (deemed illegal), make tone sample = OFFh, but DO NOT write current tone offset back into P-RAM as 0, and DO NOT write the beginning tone page number back to P-RAM 82 as the current tone page number. Otherwise, keep the tone sample as read, add one to 14 bit quantity current tone page and offset, and write the resulting least significant 8 bits back as the current tone offset, and the most significant 6 bits as the current tone page number.

 

   6. Send tone sample to codec bus (if enabled).



  Transmit PCM Highway Commands (from Codecs)
Idle
 If Idle mode is selected for a given timeslot, the CSM performs no data transfer operations. This mode should be selected for every unused transmit codec bus timeslot.



  Transmit Voice
 This mode is selected for normal voice transfer from a
PCM Hwy Tx timeslot to an outgoing network times lot via a transmit ring buffer. The CSM performs the following operations:
 1. Read Transmit (to Network) ring buffer read and write pointers from P-RAM 82.



   2. Write the byte received during this codec bus timeslot from the Tx PCM Highway (the codec transmit bus) to the transmit ring buffer, performing required checks for under or overflow.



   3. Update Transmit ring buffer write pointer information to P-RAM 82.  



  Transmit Tone
 This mode is selected to transmit the Tone (without gain switching, regardless of which receive tone mode was used) retrieved for the Receive direction to the transmit ring buffer and thus the outgoing network timeslot. If the Receive command was not one of the two Tone Commands, this command will place meaningless information in the transmit ring buffer. The
CSM performs the following operations:
 1. Read Transmit (to Network) ring buffer read and write pointers from P-RAM 82.



   2. Write the tone sample (using non-gain switched value) to the transmit ring buffer, performing required checks for under or overflow.



   3. Update Transmit ring buffer write pointer information to P-RAM 82.



  Transmit Rx PCM Highway Data
 This mode places the data from the corresponding Rx PCM
Highway timeslot into the transmit ring buffer. If this PCTL chip is transmitting Rx data onto the Rx PCM Highway, this mode loops that data back towards the network. If another PCTL is driving the Rx PCM Highway during this timeslot, the data placed in the transmit ring buffer is from another control/interface circuit (and hence a different network channel). Thus this mode can be used to bridge VPs between network channels. The CSM performs the following operations:
 1. Read Transmit (to Network) ring buffer read and write pointers from P-RAM 82.



   2. Write the byte received during this codec bus timeslot from the Rx PCM Highway (the codec receive bus) to the transmit ring buffer, performing required checks for under or overflow.



   3. Update Transmit ring buffer write pointer information to P-RAM 82.  



  Skew Calculation
 In the most general case, the HRU receives signals on upstream leg of the network and rebroadcasts them on the downstream leg of the network. The HRU provides a constant phase data signal to the downstream frequency band by adding fractional bit delay to upstream packets, as their relative phase upon reaching the HRU varies with the VIU's physical position on the network, and by inserting a pseudo-silence pattern for times in which there is no upstream data. The HRU uses a digital phase-locked loop (DPLL), well known in the art, to insert this variable fractional bit delay.



   A phase-locked loop (PLL) located in the VIU modem recovers the system clock from this downstream signal, and the
Receiver/Transmitter circuit uses that clock for receiving downstream data as well as transmitting upstream data.



   Fig. C-l shows a pair of voice interface units (VIUs) 1002 and 1004. The upstream frequency band on the broadband cable is shown schematically as a transmission line 1006, with the downstream frequency band being shown as a receiving line 1008. Each of VIUs 1002 and 1004 transmits in the upstream band (line 1006) as shown by arrows 1010, 1012. Similarly, each of VIUs 1002 and 1004 receives signals in a downstream frequency band (line 1008) as shown by arrows 1014, 1016. A series of timing marks 1018 which appear in the downstream frequency band are shown beneath line 1008 in Fig. C-1.



   As can be seen, VIU 1002 is a distance   L1    from HRU 1020, while VIU 1004 is a distance L2 from HRU 1020. If VIU 1002 attempted to transmit in a timeslot defined to begin N microseconds after a timing mark 1018 by actually starting the transmission N microseconds after the timing mark is detected, the transmission would actually be received by VIU 1002 at a time t(skew) later. Time t(skew) is   (2*L1/C)+tO,    where L1 is the distance to HRU 1020, C is the speed of the signal on the transmission medium and to is any delay incurred through the
HRU. A transmission from VIU 1004, on the other hand, will be delayed by   (2*L2/C)+to.    Accordingly, data transmitted by VIU  1002 will actually fall farther behind timing mark 1018 than data transmitted by VIU 1004.



   This problem has been solved in the past by using a clock on the transmit line as in the ring network, or using the parallel transmit clock as in the Coffey patent discussed earlier. According to the present invention, each VIU upon booting up will determine its particular skew time by transmitting a test data packet and calculating the amount of time before it receives the test data packet. This time then is designated as a skew time, and each information packet transmitted thereafter will be transmitted an amount of time equal to the skew time earlier than the time that the specified timeslot will be detected on receiving line 1008 at that particular VIU. Test packets are transmitted immediately after the reception of the frame timing mark.

  For example, if a VIU determines a skew time of 38 microseconds, this represents a network of approximately 3 miles in radius (assuming a delay of 6.25 microseconds per mile for an electromagnetic wave in the coaxial medium).



   Timing marks 1018 are preferably generated by a timing mark generator located with the HRU or in a separate timing mark generator which is coupled to some point along the transmission line. The timing mark generator can be at any location on the cable, but must broadcast within all of the frequency bands. The timing marks then will be translated into the downstream frequency band by HRU 1020.



   Fig. C-2 is a block diagram of the circuitry of any node connected to the system. A media interface unit couples the node to the media and to the control logic. An application interface unit couples the particular application to the control logic and the media. This core technology makes modularity possible and drastically reduces the complexity and time required for new application product development, enabling delivery of high quality, reliable products far more quickly.



   A timing mark transmitted by a Timing Mark Generator
Unit, is broadcast once per millisecond, establishing the link  frame structure. Each VIU's RxTx circuit, after checking the timing marks for integrity, locks its internal counters to the framing established by the timing marks.



   The VIU's CPU commands the RxTx and PCTL circuits to send signalling packets in the timeslot immediately following the timing mark. RxTx measures the skew time of the first such
SP and adjusts its transmit frame to start (SKEW) bits before the next timing mark is received (i.e., before its receive frame starts). Thus, any signalling or voice packets transmitted by a VIU will appear at the HRU at the correct instant referenced to the timing mark.



  Establishing Voice   Telenhone-Link   
 To establish a telephone call, a user picks up a phone 22 of Fig. A-4, and dials an extension number or an outside line. If an outside line is dialed, trunk interface unit 25 of Fig. A-l is the destination, and will act like the other voice stations as described below in establishing a connection to the originating station. The trunk interfacing then performs the necessary translation to send a call out on the outside telephone line.

 

   Fig. D-l shows a flow chart of the sequence of events of the originating telephone station and Fig. D-2 shows a flow chart of the sequence of events of the receiving telephone station. When microprocessor 72 detects the off-hook condition of phone 22 and the dialled number, it initiates a program stored in DRAM 85 to establish a telephone link.



   When off-hook, the telephone sits on its "home" channel, which is one of the four frequency channels on the network, as assigned during a boot operation. The microprocessor, under control of its program, causes the circuitry of Fig. A-4 to monitor timing marks and identify the position of timeslots, and then monitor the timeslots for the presence of pseudo silence. Pseudo silence is a series of alternating l's and 0's which is inserted by the HRU to maintain synchronization. If other than pseudo silence is  detected, this means that a transmission is occurring in a particular timeslot by another station. A table is kept in
PRAM 82 of the busy and free timeslots.



   The program routine initiated by a telephone call first calls a function designated "claim-new" in order to claim a new timeslot. A random one of the free timeslots in the busy/free table in PRAM is chosen. The timeslot will be free in PRAM if no transmissions have been detected for 8 cycles or more. A dummy transmission packet (CVP - claiming voice packet), containing a unique identifier will then be transmitted in the selected free timeslot. The channel is then monitored to detect the return of the dummy packet on the receiving end of the selected channel as a result of the retransmission by the HRU. The received packet is compared to the originally sent packet, and if it is the same, no collision has occurred with another station trying to transmit.



   If the CVP (claiming voice packet) is successful, subsequent occurrences of the timeslot are then filled with dummy data packets to maintain ownership by the originating station. If a collision has occurred, the process is repeated with a random selection of another free timeslot. At the same time that dummy packets are being inserted into the claim timeslot, a signalling packet is sent out on the same channel in the signalling packet position of a frame. This signalling packet specifies the originator's home channel and the position of the voice timeslot that was claimed, in addition to the originator's LUA address and the destination address. Again, the signalling packet is monitored on the return channel to ensure that no collision has occurred. If a collision has occurred, a retransmission is done after a random amount of time.

  After a successful transmission of the signalling packet on the home channel, modem 70 of Fig. A-4 is switched to the next channel and another signalling packet is sent in the same manner. This process is repeated until a signalling packet has been sent on all channels. The modem is then returned to the home channel to monitor the channel for a response.  



   At the receiving end, the address node is constantly monitoring for signalling packets addressed to it, even if it is involved in a conversation. These signalling packets (SPs) are filtered by hash tables as discussed earlier. Each node contains a 64 bit hash table for each of its PUA, LUA and SLE addresses. As SPs are detected, the last six bits of the cyclic redundancy check of the address is used to produce a number corresponding to a position in the hash table. If a bit is set in this position, the signalling packet is then examined by software to determine if the address is for this node. If the bit is not set, the SP is ignored. Thus, the hash table provides a quick, initial filtering.



   If the node has been addressed, and it is busy, a signalling packet will be sent to a trunk interface unit (TIU) with instructions for it to be retransmitted on the originator's home channel to inform the originator that the called node is busy. Since the modem of the receiving phone is busy, it cannot itself switch to another channel to send the response directly.



   If the called node is not busy, it will switch its modem to the caller's home channel and monitor the transmissions to fill its busy/free table. The called node will then attempt to claim the timeslot in the reverse frame of the one occupied by the calling party. The reverse frame is simply an alternate frame, with originating party only occupying every other frame. The definition of which is the forward and which is the reverse frame is accomplished simply by the timeslot being claimed by the originating party being designated the forward frame, and thus could vary.



   A timer is set to provide sufficient time for the busy/free table to become valid. When the timer expires, the timeslot of the originating node is examined to see if it is still occupied. If it is not, it is assumed that the call has been terminated. If it is still occupied, the called station attempts to claim the reverse times lot in the same manner as the originating station claims the initial timeslot. If such a  claim is unsuccessful after several tries, a new timeslot is claimed and the originating station is informed in the same manner as if the called station were the originating station.



  The originating station will attempt to move to the reverse frame of the newly specified timeslot.



   Once there is a successful claiming of the reverse timeslot, the called station transmits an indication to this effect to the originating station in a signalling packet.



  Thereafter, voice transmissions are sent in the voice packets.



  Session Laver
 As described above, the session layer provides services required to establish and maintain connections between nodes on the network.



   Depending on the application and presentation supported on the different types of nodes, session has to support different interface functions. In the case of the VIU and AIU, presentation functions are performed by the codec in the AIU and hardware and software controlling the VIU. The application layer function is to support the common telephone interfaces to the end user. The codec chip provides analog to digital conversion (and vice versa). Hence the services provided by the VIU and AIU sessions also include the following:
 (a) Accept and interpret the keyed-in information.



  Keyed-in information will be suitably decoded by the presentation layer before providing it to the session layer.



   (b) Provide the appropriate digital information to the codec to generate suitable tones to the user to indicate call progression.



   (c) Monitor the hook-switch changes and take appropriate actions.



   (d) Control the flow of digitized voice between the codec and the network.



   (e) Provide digital information for the VIU software to display the appropriate status of the calls and feature  activations.



   In addition to providing services as outlined above, the session layer must rely on certain services from other layers. This includes exchanging signalling information (transport layer), reserving voice circuits (link layer), and tone generation (link layer).



   The nodes connected to the network exchange the signalling information using (SP's). In order to communicate with other session layers using these SP's, a session layer must be able to set certain requirements on the way in which an
SP is transferred over the network. In general session must be able to specify the RF channel(s) on which a signaling packet has to be transmitted, whether it should be notified of the delivery of the SP or not, cancelling of the SP transmission request etc. In addition it must also receive the notification of any SP received for its consumption. The transport layer provides these services to the session layer.



   The transport level supports the following transaction types required by the session layer.



   TI(R) is a transaction information frame. It is transmitted as a "reliable" datagram, and will carry session data. An acknowledgement is expected from the receiving session. If no acknowledgement is received within the set time-out, sending session will get notification from the transport.

 

   TI(P) is a transaction information frame. It is transmitted as a "pure" datagram and will carry session data.



  It requires no acknowledgement from the receiving session.



  Best effort will be made (by the link layer) to transmit the packet.



   TI(R¯ACK) is a transaction information frame similar to TI(R). It is transmitted as a "reliable" datagram and carries session data. In addition it will acknowledge the receipt of a transaction being received by the session.



     TI(P ACK)    is a transaction information frame similar to   TI (P).    Transmitted as a   "pure"    datagram and carries  session data. In addition it will acknowledge the receipt of a transaction being received by the session.



   TR(S¯ACK) is a transaction response frame generated by the session. It is transmitted as "pure" datagram. It will carry no session data and acknowledges the receipt of a TI(R) or   TI(RACK).    In addition, receipt of this frame indicates that the receiving session has accepted the service request.



  Receiving transport will notify the receipt of this frame to the session.



     TR(SNACK)    is a transaction response frame generated by the session. It is transmitted as a   "pure"    datagram. It will carry no session data and acknowledges the receipt of a
TI(R) or TI(R¯ACK). In addition, receipt of this frame indicates that the receiving session has rejected the service request. Receiving transport will notify the receipt of this frame to the session.



     TR(TACK)    is a transaction response frame generated by the transport. It is transmitted as a   "pure"    datagram and acknowledges the receipt of a transaction in proper sequence by the transport. This acknowledgement is for the transport layer and will not be passed to the session.



     TR(TNACK)    is similar to TR(T¯ACK). However it informs the transport that an out of sequence message was received by the transport.



   The digitized voice between two communicating nodes is transmitted on dedicated VTS's. In order to establish a voice communication, a node must be able to reserve a pair of
VTS's for its exclusive use. When a node initiates a call request through a SP, it will inform the other node(s) that a particular VTS has been reserved. It will also indicate to that node, which time slot of the reserved VTS pair is going to be used by the requesting node for transmission of digitized voice. If more than one node is willing to communicate, then they must able to contend for the response time slot (the remaining time slot in the reserved VTS pair). The node which is successful in contending for this time slot will get the  right to complete the communication with the requesting node.



   In order to provide the above function, session layer requires the following services from the link layer:
 (a) The ability to reserve a VTS pair. This VTS pair is referred to as a voice circuit ("VC") and is used for full duplex voice communication between the two nodes.



   (b) The ability to contend for the response time slot (one of the time slots within the reserved VTS pair).



   (c) The ability to specify a delay factor while contending for a VTS. This will give the capability to prioritize the claiming between the contending nodes.



   (d) The ability to specify the transmission of either silence or voice on a VTS.



   (e) The ability to specify transmission (either voice or silence) without contending for the responding VTS.



  This will be used when the node is aware of the fact that other nodes are not competing for completing the communication path.



   (f) The capability to detect the absence of data on a VC (either silence or voice) for disconnect purpose.



   In order to support the standard telephone interfaces to the user, session must be able to provide the codec with the digital data required to produce the appropriate call progression tones. In order to provide this, session requires the following services from the link layer:
 (a) The ability to specify the type of tone and direct it to either codec or network or both.



   (b) The ability to stop the tone.



   (c) The ability to interrupt an active voice path and provide a tone for a specified amount of time and then continue with the voice communication.



   (d) The ability to initialize and change the tone buffers used by PCTL 92 for tone generation at run time.
 There are 1000 available SP time slots per second, on which a node can transmit a SP. However this SP space is partitioned into eight spaces and a session sending a SP can specify the partition(s) on which this particular SP has to be  transmitted. Since the SP space is available to all the nodes, it is possible that more than one node may transmit simultaneously, which will result in collision. These collisions will be detected and suitable actions will be taken by the lower layers. The session layer will be able to specify the transaction type for transmitting the SP. It is the responsibility of the transport layer to guarantee the reliable delivery of a SP (if desired by the session).

  The SP's will be transmitted by the transport as one of the transaction frames described earlier.



   SP's are used by the session layer for the purpose of establishing a call between nodes. SP's are also used for the purpose of activating or cancelling some end user features and for negotiating some special services for the users. It should be noted that a VIU session will generate SP's for AIU, TIU, or
NBU sessions (or vice versa). Therefore protocols are described according to the session which initiates the SP flow.



  Hence the responding node could be of the same or different type. The destination address field in the SP header will determine the node(s) to which a SP is intended for.



  Call Processina Protocols
 A user action on a VIU (either an attempt to establish a call or activate/cancel a particular feature) may result in a set of protocols (i.e. exchange of different SP's).



  The discussion below will describe these protocols.



  When a VIU user initiates a call request (by dialing digits), depending on the digits dialed it will result in one of the following set of protocols. In general when a user intends to make a call request (either to another station on the network or to a off-net number) a   CALL¯REQUEST    SP will be generated. As a general rule the following conventions are observed before transmitting a CALL REQUEST SP.



   (a) Reserve a VC (a pair of VTS's).



   (b) Determine the channel (or channels) on which the
CALL¯REQUEST has to be sent. In general if the CALL¯REQUEST is  intended for the other similar type of node which has only one modem (an AIU or another VIU), then the CALL¯REQUEST SP is sent on all the available RF channels. If the destination node has one modem per RF channel (e.g., TIU's and NBU's), then
CALL¯REQUEST SP is sent only on one specified channel.



   (c) Specify the RF channel on which it expects responses (usually the channel on which the VC has been reserved).



   Only CALL¯REQUEST SP's will be broadcast on all available RF channels. Other SP's will be transmitted on only one of the RF channels as determined by the CALL¯REQUEST SP.



  There are some exceptions to these rules in some specific protocols.



   Figs. E-1 to E-3 show the SP's exchanged when the destination station is an individual extension   ("lie").    Fig. E1 shows the situation where the IE can accept the call (Note:
Apply Ringing is shown as a generic indication, it could as well be a call waiting indication). When the station is initiating a call request for another station on the network it will do so by sending the CALL¯REQ¯EXT SP. If the responding station is an IE (i.e., it is the only extension with that address on the network) and is willing to accept the call, it will send an ACCEPT(IE) SP on the specified RF channel. 

  When the calling session receives this response, it determines that there is only one station with this extension and acknowledges this station by sending an ACK SP. (It must also be noted that whenever a transport layer receives an ACK packet of any type (TR(S¯ACK), TR(S¯NACK),   TI(PACK),    or   TI(RACK))    it will clear its retransmit table of the transaction which caused this particular ACK).



   When the receiving station user answers the call, an
ANSWER SP will be sent. When this is acknowledged by the calling station, the call will be completed. If no ACK SP is received by the called station within the set time, then the called station will receive dial tone.



   Fig. E-2 shows the situation when the called  extension is an IE and cannot accept the call because either the station is busy or it has DND in effect. In such a case, it will send a BUSY(IE).



   Fig. E-3 shows the situation where, for some reason, no response was received within the set time-out. In such a case, the transport layer will notify the same to the session layer, at which point a REORDER tone will be given to the user.



   Figs. E-4 to E-7 show the situation where the called extension is a MAE, which means that more than one station may respond to the call request. Fig. E-4 shows the case where at least one station can accept the call. In the example there are three stations which have a line appearance for the same extension. Notice that ACCEPT (MAE) and   BUSY (MAE)    are transmitted as TI(R) and not as TI(R¯ACK). This is done with a purpose. If the transport does not receive an ACK, it will not clear its retransmit table for this transaction. If a station in a MAE has missed the CALL REQUEST SP in the first transmission, it is possible that it might receive it in subsequent retransmission. Thus, using these multiple broadcasts increases the probability of successful delivery of the CALL REQUEST SP to all the stations in a MAE.



   It is possible that many stations belonging to the
MAE groups will try to respond simultaneously. This will increase the probability of SP collisions. This can be reduced by using some arbitration scheme for sending the response SP's.



  In the present arbitration scheme, each MAE member will have an assigned position number for each of the stations within a MAE.



  When a   CALL REQUEST EXT    is received for a MAE extension, each station in the MAE will delay its response by an amount proportional to its position number [e.g., (n-l) x 10 msec.



  where 'n' is its position in the group). This will reduce the probability of SP collisions. In order to minimize the maximum response time, the total number of appearances for a MAE extension will be limited (say to 10).



   When the destination extension is a MAE, if the calling station decides to disconnect the call before the call  is answered, then a DISCONNECT SP has to be sent to all the ringing stations in the MAE. To facilitate this it is necessary for the calling station to maintain a list of ringing stations. It is awkward to maintain a list of responding extensions. In addition, the calling station would have to send a number of DISCONNECT SP's as "reliable" datagrams. To avoid this, a CONTINUE RING SP is broadcast on all the RF channels periodically (say every 1.5 sec.) as a TI(P). When a station answers the call by going off-hook, after acknowledging that station with an ACK SP, a   STOP¯RING    SP is broadcast on all the RF channels. If a station receives this SP and if it is still ringing, then it will stop the ringing.

  If a station does not receive the STOP RING SP, it will monitor for
CONTINUE RING SP. If a ringing station does not receive at least one CONTINUE RING SP within a set period (say every 5.0 sec.) it will stop ringing the station. CONTINUE RING and
STOP RING SP's together provide a robust scheme in the MAE environment.



   It is possible that more than one ringing MAE extension go off-hook simultaneously. In this event, only one of these stations will get the ownership of the voice circuit and will answer the call by sending an ANSWER SP. The other stations will receive a dial tone.



   Fig. E-5 shows a MAE configured for the "single call" mode. In this mode, only one call is allowed on a MAE. If a station with one MAE extension is busy, it will be reflected on all the appearances of that MAE. If a MAE is configured for this mode, when a ringing MAE station receives a STOP RING SP it will make itself busy. It will also monitor for a
CONTINUE¯BUSY SP (say with a periodicity of 2 min.). If a busy
MAE (which is not involved in conversation) does not receive this SP in the set period, it will make itself idle.



   Fig. E-6 shows the disconnection of a call after establishing a voice path. In such a case, it is necessary to make other stations in that MAE idle. A   MAKE¯IDLE    SP will be broadcast as soon as a disconnect is detected.  



   Fig. E-7 shows the situation where the called extension is a MAE and at least one   BUSY (MAE)    is received by the calling extension. If no ACCEPT(MAE) is received before the expiration of time-out, a busy tone will be given to the user.



   Figs. E-8 to E-11 deal with hunt groups. Hunt group extensions provide a mechanism to locate the first idle extension within a set of extensions. This means when a call request is made to the hunt extension each member can answer the call only if a member with the higher position has not answered the call already. In order to provide this prioritized mechanism a call request will have an integer call attempt number in the CALL¯REQUEST SP (This integer number is transmitted as part of   CALL REQ EXT    SP.   CALL REQ EXT(n)    indicates the nth call request attempt for a hunt group). Each member in a hunt group will have a position number assigned to it. When the number in the CALL¯REQUEST SP matches the position number then that station will answer the call by sending either an ANSWER or a BUSY SP.

  The above scheme is sufficient if it can be guaranteed that all the members in the group will always be able to respond. In the event that some members may not be able to respond, it must be possible to make a new request to the next member. The following procedure supports this capability.

 

   If the CALL¯REQ¯EXT(1) is received by the hunt group members only the station with position 1 will send either an
ACCEPT (HUNT) or BUSY (HUNT) SP. However, each other member will send the pertinent group information and its current status by sending HUNT¯GRP¯INFO (number of members in the group, terminating conditions if the last member does not answer the call, Busy/free). This SP is sent as a TI(P) and will not acknowledge the call request. Similar to MAE, hunt members will delay their response depending on their position to reduce the probability of SP collisions.



   When the CALL¯REQ¯EXT(n  >  1) is received by a hunt group member, it will compare its position number with 'n' in  the call request SP. If they both match, it will send
ACCEPT(HUNT) or BUSY(HUNT). These SP's will have other pertinent group information (number of members in the group, terminating conditions if the last member does not answer the call).



   If it is necessary to make a call request (with n  >  1), then the Busy/Free information received in HUNT¯GRP¯INFO
SP's in response to the first call request attempt will be used to reduce the number of requests made. The requests will not be made to the members which sent the BUSY information explicitly.



   If a busy response (or no response) is received for a call request made to the last member in the group then the call is terminated according to the terminating condition received in the hunt group information.



   Fig. E-8 shows a situation where the first member of the hunt group has answered the call.



   Fig. E-9 shows a situation where the first two members in the group are busy. A new call request will be made to the next member soon after receiving the   BUSY (HUNT) .   



  BUSY(HUNT) is transmitted as a TI(P¯ACK).



   Fig. E-10 shows a situation in which the first member of the hunt group failed to respond to the   CALL¯REQ¯EXT(1).   



  Note that the HUNT¯GRP¯INFO SP's are transmitted as a TI(P).



  Hence the calling station has to wait till the time-out is elapsed. This gives a chance for the first member to receive retransmitted call request SP's.



   Fig. E-ll shows a situation in which some hunt members are not responding. It must be noted that successive new call requests are made till all the members have been given an equal chance. Note that the calling station has to wait till the elapse of time-out to make a new call request when a hunt group member does not respond.



   Figs. E-12 and E-13 relate to trunk calls. When the user dials digits requesting another user outside the network, then the session will initiate a trunk call request by sending  
CALL¯REQ¯TNK SP to the trunk group address. Since more than one trunk group may be willing to answer the trunk call request, an integer number in the request SP specifies the group to which the request is made (similar to hunt group members). It is also possible to have a different extension for each trunk group. In this case there is no need for the integer data in the call request SP. In this case address filtering will be handled by the link layer. The decision to address a particular group has to be made by the session. This means some trunk addressing algorithms have to be implemented in the VIU session layer.



   Within each trunk group there can be a number of trunk interface modules (TIM's). Since each TIM will know the availability of its own trunks, an arbitration scheme is required for selecting only one trunk from different TIM's within the group. More particularly, each TIM within a group will have a position number associated with it. When a
CALL¯REQ¯TNK is received by a TIM (which has the trunk group specified by the request number) it will perform the following functions.



   If all the trunks within the TIM are busy, then that
TIM will send a TRUNK ACK INFO SP after delaying it for a time proportional to its position number (say n x 10 msec. where n is the position number of the TIM). This SP will have information such as whether another trunk group exists or whether it is the last member within a group. This SP is transmitted as a TI(P) and will not cause the transport to clear its retransmit table. The delay factor used for transmitting the SP will reduce the probability of SP collisions when more than one TIM in a group is busy.



   If a trunk is available, then the TIM will try to claim the response voice time slot after a delay period.



  Delay =   RecvCycle¯&num;    + nl + n2 x (n-l), where    Recv Cycle = = Cycle number on which the   
 SP request was received,
 nl = a pre-determined number of cycles  
 (to allow session/transport response time),
 n2 = a predetermined number of cycles (say 5),
 n = position number of the TIM).



   If after the elapse of the delay period, the TIM is successful in claiming the response voice time slot then it will seize a trunk and send an   ANSWER¯INT    SP to the caller.



  Note that the delay used favors the TIMs with lower position numbers and provides a method of locating an available trunk starting from the first trunk within a group. The delay used will be a cycle number and claiming is delayed till at least that cycle number before transmitting the   ANSWER¯INT    SP. This delay will be implemented in the link layer. Also the link layer will copy   Rezv¯Cycle¯&num;    of a received SP from a register in the control/interface circuit to the SP buffer in the PRAM.



  The   ANSWER¯INT    SP indicates to the caller that a trunk has been seized and that the TIM is expecting the final call request SP   CALL¯REQ¯TNK FNL.   



   Since the same trunks are shared by the network and other outside networks which are making calls to stations on the network, it is possible that a TIM may find itself with no trunk available after claiming the response VTS successfully.



  In this case it will release the response VTS and send a
TRUNK¯GRP¯INFO SP to the caller.



   When the caller receives the   ANSWER¯INT    SP from a
TIM, a trunk is available for the user and the caller will send a CALL¯REQ¯TNK¯FNL SP to this TIM only, so that the TIM can establish communication with the outside party.



   Fig. E-12 shows the case where a trunk is available in the group. Note that TIM1 is busy and sends TRUNK¯GRP¯INFO immediately as a TI(P).



   Fig. E-13 shows the case where no trunk is available in the first group. Based on the information received in the
TRUNK¯GRP¯INFO SP, the caller makes a second request to another trunk group. Note that some TIM's are not responding and the last TIM is busy and sending TRUNK¯GRP¯INFO as a   TI(P ACK)    and will cause the transport retransmit table to be cleared. In  the second group also no trunk is available and the
TRUNK GRP INFO SP indicates that no further group is available and the caller receives a REORDER tone.



  Feature-Related Protocols
 Figs. E-14 to E-39 illustrate the protocols that are carried out when a user invokes a feature, either before or during a call.



   Figs. E-14 to E-16 deal with call holding. When a user invokes the   "hold"    feature (either implicitly or explicitly), at the station initiating "hold" the receive side of the "VC" is disabled   (Drop Rx).    When the other station receives the HOLD SP it will disable both receive and transmit   (DropLRx    and Drop¯Tx) and enters a HELD-BY state. When the station invoking   "hold"    receives the ACK it will drop transmit, make the circuit available to the network and enter a HOLDING state.



   If the station in HELD-BY state is a MAE configured for a "single call" mode, then the station which invoked the hold will broadcast a CONTINUE¯HOLDING SP periodically (2 min.). If the members in that MAE fail to receive this SP, then they will become idle. (Note : This SP is similar to
CONTINUE¯BUSY SP in the active state).

 

   If the station in the HOLDING state is a MAE configured for a "single call" mode, then the station in the
HELD-BY state will broadcast a CONTINUE¯TO¯HOLD SP periodically (2 min).



   When the station in the HOLDING state invokes "unhold", a new VC is reserved and the other station is notified. When the other station receives the UNHOLD SP it will enable its transmit and receive using this new circuit.



  It is not necessary for the HELD-BY station to compete for the response voice time slot as it is the only one which is in
HELD-BY state. A simple one-way hold is shown in Fig. E-14.



  When a station in HELD-BY state invokes the "hold" feature, then both the stations will enter a TWO-WAY hold state. If  either of the stations is an MAE configured for "single call" mode, other station will send CONTINUE¯TWO¯WAY SP periodically (2 min.). Two way hold is as shown in Fig. E-15.



   It is possible that both stations might invoke "hold" simultaneously. In this case when the stations receive a HOLD
SP, each station will enter a HELD-BY state and send an ACK.



  When the ACK is received, each station will enter TWO-WAY-HOLD state. When a station in the TWO-WAY-HOLD state invokes "unhold", after receiving an ACK, it will enter a HELD-BY state. The other station after receiving an UNHOLD SP will enter the HOLDING state. Then this will be the same as oneway-hold case. If a station in HOLDING state receives a HOLD
SP, then it will enter the TWO-WAY-HOLDING state. If a station in the HELD-BY state invokes "hold" then it will send a HOLD SP and after receiving the ACK will enter a TWO-WAY-HOLDING state.



  If the stations in TWO-WAY-HOLD state invoke "unhold" simultaneously, then the station with the higher LUA will claim a new VC and acknowledge the "unhold" first by sending a   TI(RACK).    The second station then enables this circuit (Tx¯Voice, Rx¯voice) and acknowledges the earlier UNHOLD SP.



  The simultaneous hold and unhold situations are shown in Fig.



  E-16.



   Figs. E-17 to E-19 deal with call forwarding. When a station invokes the "forward" feature to redirect incoming calls to another station in the Interconnect a FORWARD¯REQ SP is transmitted on all the RF channels. If the destination station is willing to accept the calls, it will send an ACK and the user will receive a confirmation tone. This situation is shown in Fig. E-17. If a station is not accepting the forward request, then it will send a FORWARD¯DENIED SP as a TI(P).



  This will allow other stations, if any (e.g. destination is MAE or hunt group) to respond. If no ACK is received before the time-out and if at least one   FORWARD¯DENIED    SP was received, then the user will be given a Denial Tone. This situation is depicted in Fig. E-18. When a CALL¯REQ¯EXT SP arrives at the forwarded extension, it will send back a FORWARDED¯IND SP. At  this time, the calling station will make a new call request to the destination station as shown in Fig. E-19.



   In order to avoid the circular forwarding effect when chain forwarding is in effect at the destinations, the number of times a station can receive a FORWARDED¯IND will be limited to 2. If the calling station receives more than this number of   FORWARDED IND    in a row (i.e after making new call requests to the destination station), it will not make any further call requests and the user will hear ring back at this stage.



   Fig. E-20 shows the case when a first user has put one user on hold and is active with another user. The first user can invoke the "consult" feature and switch to the other call. The SP exchange is similar to One-Way hold.



   Figs. E-21 to E-26 deal with call transfer. A user (B) wanting to transfer a currently active call to another extension (C) puts the first call on hold and will try to establish the call with the other station. If the station trying to transfer (called the arbitrator) waits until the other station (C) answers the call and goes on-hook, the call will be transferred automatically. The SP exchange in this situation is shown in Fig. E-21.



   However it is possible that the arbitrator may go on-hook before the call gets answered. Therefore, the arbitrator station has special responsibility to see that SP exchanges are handled properly. Depending on the destination extension type and the state of the call, the following things can happen. If the destination extension is an IE and the arbitrator (B) goes on-hook after hearing the ringing, then the
SP exchange is as shown in Fig. E-22.



   However, if the user chooses to go on-hook immediately and if the ACCEPT(IE) is received afterwards, then the ACCEPT(IE) is ignored by the arbitrator (B) and the call between the arbitrator and destination station (C) is terminated. The caller on hold (A) stays on hold to the arbitrator. If the destination extension is a MAE, then the arbitrator station will ACK the ACCEPT(MAE) SP's until the  time-out. Then it will send TRANSFER¯REQ on all the RF channels. If at the end of another time-out at least one   ACCEPTXFER    is received, it will complete the transfer by sending a TRANSFERRED¯IND SP. At this time the station which requested the transfer will monitor the call (Apply ringback, send CONTINUE¯RING SP etc.). The SP exchange in this case is as shown in Fig. E-23.



   If the called extension is a hunt group, and the station has sent an ACCEPT SP, then the situation will be similar to that of an IE. However, if a BUSY (hunt) is received for a call request, then the new call request to the next member is done by the station requesting the transfer. The SP exchange in this situation is as shown in Fig. E-24. If there was no response from the first member of the hunt group and at least one   HUNT GRP INFO    is received before the elapse of time-out, then the SP exchange will be as shown in Fig. E-25.



   If a transfer request has failed for any reason (e.g.



  no response before the elapse of a time-out, or a BUSY¯ACK(IE) is received, or at least one BUSY¯ACK(MAE) is and no
ACCEPT¯ACK(MAE) is received, or BUSY¯ACK(hunt) is received from the last member of the group), a TRANSFER¯FAIL SP is transmitted to the station requesting transfer. At this time if a station (or TIM) is configured for ringing the arbitrator again, then it will send a   RING¯AGAIN    SP as shown in Fig. E-26.

 

   Figs. E-27 and E-28 show the SP exchange for call waiting. If an extension is configured for a call waiting, it will receive a call waiting indication if a second call arrives when the extension is already busy with one call. If the user chooses to answer the new call by disconnecting the current call, then he (or she) will receive ringing after disconnection. This situation is shown in Figure E-27. On the other hand, the user can put the first call on hold by invoking the "consult" feature as shown in Fig. E-28.



   Fig. E-29 shows the SP exchange for call pickup. A ringing extension (directed pickup or group pickup or night answer) can be answered by another extension with this feature.  



   Fig. E-30 shows the SP exchange for call park.



  Invoking the "call park" feature, a user can park an active call at another extension.



   Fig. E-31 shows the SP exchange for call retrieve.



  As user may invoke the "call retrieve" feature at an extension to retrieve a call parked at another extension.



   Fig. E-32 shows the SP exchange for camp on. A user after receiving busy tone, can invoke the "camp-on" feature.



  When the called station becomes idle it will send a CALLBACK SP to the calling station to indicate that it is free. This will initiate ringing at the calling station. When the user goes off-hook a new call request is made to the called party (with
LUA as calling address) automatically. If the called station is not an IE, a CAMP ON CANCEL SP is broadcast. If the station invoking the "camp-on" feature is busy when the CALLBACK SP is received, the user will receive a call waiting indication. At this time, if user goes on-hook, he will hear ringing.



   Fig. E-33 shows the protocol for establishing a conference call. A 3-way conference is established when a user with two calls (one active and other on hold) invokes the "conference" feature. A conference server (the NBU) is involved in the conference. All the parties involved will have a full duplex voice path to the server. The station establishing the conference is responsible for obtaining the server resource.



   Figs. E-34 and E-35 show the SP exchanges for an AIU operator can invoke the "override" feature to barge-in to a currently active call. The SP exchange when an attendant invokes this feature during an active call is shown in Fig. E34. When the station has DND in effect, invoking "override" will cause ringing at the station. This is shown in Fig. E-35
 Figs. E-36 and E-37 deal with disconnecting ringing or held calls. If the calling station disconnects a ringing call, and the ringing extension is an IE, a DISCONNECT SP is sent as a TI(R). When an ACK SP is received by the calling  extension, it will become idle as shown in Fig. E-36. If the ringing extension is a MAE, the calling station will broadcast a DISCONNECT SP and will become idle as shown in Fig. E-37.

  If for some reason, a ringing MAE extension does not receive the
DISCONNECT SP, it will continue to monitor for CONTINUE RING
SP. The station will become idle when it does not see
CONTINUE¯RING SP within the expected time.



   A station in the HELD-BY state can disconnect a call by going on-hook. If the station in the HOLDING state is not a
MAE configured for "single call", a DISCONNECT SP is sent as a
TI(R). The HELD-BY state station will become idle after receiving the ACK SP as shown in Fig. E-38. If HOLDING station is a MAE configured for a "single call", a DISCONNECT SP is broadcast and the HELD-BY station will become idle as shown in
Fig. E-39. If for some reason, a HOLDING MAE extension does not receive the DISCONNECT SP, it will continue to monitor for
CONTINUE TO HOLD SP. The station will become idle when it does not see a CONTINUE¯TO¯HOLD SP within the expected time.



  Time-Frequency Multiplexing
 Fig. F-1 is a block diagram of the HRU and its connection to the network and the outside trunks. In the embodiment shown, HRU 1020 includes 4 Network Head-end Cards (NHC) for channels 1-4. Each NHC is identical and includes a receiver 1022 and a transmitter 1024 coupled to network medium 1026. Packets received through receiver 1022 from medium 1026 are processed through the fast phase lock loop, MLD 1020, before being returned to transmitter 1024. Each NHC is coupled to the same medium and receives upstream transmissions from the voice interface units 1030 and retransmits them downstream on medium 1026 on a different frequency. This is done by first receiving the upstream data, reconstructing it, synchronizing it with MLD 1028, then remodulating it with the proper downstream carrier frequency for retransmission.

  A path is also provided from MLD 1028 to an Input/Output Processor   (IOP)    1032.   IOP    1032 essentially multiplexes the four channels onto  a trunk bus 1034 for connection to one of trunk interface cards 1036. Each trunk interface card 1036 couples to an outside trunk 1038 for outside calls. These trunk interface cards could couple to a central office, or other types of trunks which are standard in a public telephone switching network.



   Fig. F-2 shows the phase locking of the clocks of four NHC cards. An external clock may be provided to a clock receiver 1040, which is then phase locked to an internal clock of one of the NHCs in a primary phase lock loop 1042. This is used to produce two master clocks A and B. Enable logic 1044 will enable the A clock on one NHC and the B clock on another
NHC to be applied to the A and B clock buses, and disable the connection to the A and B buses for the clocks on the other
NHCs. The A and B clocks are then provided to all of the NHCs, and a select circuit 1046 examines the clocks to determine which is a better quality. Thus, if one of the NHCs has a bad oscillator, its clock will not be selected. The A clock is selected by default in the event they are similar. If no external clock is present, the oscillator of the primary phase lock loop 1042 is used as the A or B clock.



   A secondary phase lock loop 1048 on each NHC phase locks to the system A or B clock and produces four different phase clocks for use in the NHC circuitry as needed. Thus, all
NHCs are synchronized to the same A or B clock.



  Maximum Likelihood Detector (MLD)
 The NHC implements a data reclocking scheme to time align all data being passed through the NHC. Since the upstream transmission is supplied by an unknown source with regard to phase, the reclocking circuit uses a maximum likelihood detector or MLD to reclock the data. The standard solution of phase locking a clock from the incoming data edges is not workable since a PLL with such a short integration time would be far less stable than is needed for the system, and extremely difficult to build. The MLD detects the edges in 4 bits of packet preamble, and then delays the data path by a  time of   0    to 1 bits, (in increments of .062 bits) to properly align the center of the data bits and the edge of the sampling clock.



   With this method, no frequency lock is required since the NHC's downstream transmissions are the system's source of master clock. All of the system's PLLs and clocks are frequency coherent unless a given unit is in failure mode; in which case it will be supplying no broadband transmission and does not pose a problem. With this understanding, we can assume that the NHC's MLD circuit must only account for phase or time alignment differences. The described functions can be implemented with high speed digital circuitry that responds to the received packet's needs within a four-bit time span during the packet preamble. The selected delay will remain locked until a loss of carrier is detected at the head-end which will be interpreted as an "end of packet". The NHC will begin inserting a pseudo-silence pattern (PSP) and reset the MLD for the next packet.

  The PSP maintains synchronization between transmissions. There must be a minimum of two bit-times between packets when no carrier is present to allow the MLD circuit to reset.

 

   Referring to Figure F3, there is shown a block diagram of one type of maximum likelihood detector (MLD) 1152 suitable for use in accordance with the invention. The MLD 1152 comprises a shift register 1130, a bit stream combiner 1132 and a two-level to three-level data converter 1134. The shift register 1130 has associated therewith a high-speed clock 1136 and a bit synchronizer 1138. The bit stream combiner 1132 uses as an input either a received transmission as provided by bit synchronizer 1138 or, if no carrier is detected, a continuous pseudo data source 1140. The function of pseudo data source 1140 is to provide a continuous string of pseudo data, for example, 1 0 1 0 1 0 format data as the pseudosilence pattern (PSP).

  The continuous data stream is then provided to the data converter 1134 where two level data is converted to three level data This conversion is done by  translating the data stream into 2 parallel data streams at one-half the frequency. The 2 streams are then converted into a single, three level data stream at the same on-half frequency. This results in data with more than one bit per hertz. The output of the data converter 1134 is coupled to the transmitter of the HRU.



   The purpose of the MLD 1152 is to align data for optimum reception. The various signals received in burst mode through the HRU receiver. Each exhibit different phases as a result of differences in distance along the upstream channel from the HRU, as well as differences in filter delays and differences in the phase of any local clock. The MLD 1152 adjusts for differences in the phase of the input data so that the system clock used in connection with receiving the data in a synchronous format can strobe the received data at or near the midpoint of the bit in the bit stream. To this end, the shift register 1130 is clocked by a high speed clock 1136 at, for example, eight times the input data rate whereby each input bit is shifted to eight possible positions in turn for output at a selected tap 1142, 1144, 1146, 1148, 1150, 1152, 1154 or 1156.

  In the specific embodiment, each tap of the shift register thus presents an output data stream differing in time delay by one eight bit from the adjacent tap. The bit synchronizer 1138 monitors each one of the taps and selects by means of appropriate optimization a bit stream from one of the taps, providing as its output a bit stream to the bit stream combiner 1132. The bit synchronizer 1138 may, for example, include a multiplexer and means for checking each of the input bit streams for errors due to sampling at a less than optimum phase. Should it be deemed unnecessary to adjust the phase automatically, the bit synchronizer may comprise a simple selector switch coupling one selected tap through to the bit stream combiner 1132.



   MLD 1152 operates by having the bit synchronizer 1138 examine the data bits as they pass along the shift register 1130. The time relationship between the rising edges and the  falling edges of the data bits are compared to those of the system clock. Based upon the calculations made by the bit synchronizer 1138, the appropriate shift register tap among the eight possible taps 1142-1156 is used to extract the data and send it to the bit stream combiner 1132. This calculation estimates the center of the data bit.



   The center of the data bit must be known relative to the system clock. (The system clock is derived from the high speed clock 1136 which also runs the shift register 1130.) The bit synchronizer 1138 examines one of the lines 1142-1156 and notes when the edges of the data bits occur with respect to each other and with respect to the system clock. The time relationships are measured in terms of the periods of the high speed clock 1136. This examination occurs on the first portion of the incoming data stream which has a preamble especially designed to ease the task of the bit synchronizer (usually a 1 0 1 0 1 0 1 0 sequence) and also to allow the synchronization process to occur before the message bits arrive.



   The data clock, consisting of two phases CLK phase 1 and CLK phase 2, at the nodes is derived from the bit rate of the continuous downstream bit rate transmitted by the head-end.



  Thus, the burst (packet) transmissions from the VIU nodes to the head-end are at a frequency known to the head-end but at an unknown phase. Once the MLD 1152 determines the phase, that phase is constant throughout the burst transmission.



  Therefore, once the MLD 1152 ascertains the phase of the preamble it does not make any further adjustments for the remainder of the burst transmission.



   The center of the bit times are calculated by taking the bit period, that is, the time between the start and the end of a bit as measured in high speed clock 1136 periods, and dividing by two. This measurement can be made by a counter within bit synchronizer 1138 which is started when a bit transition occurs and is stopped when the next transition occurs. A similar counting method can be used to determine the time relationship between the bit edges and the master clock  edges. The appropriate shift register 1130 output 1142-1156 to take the data from is found from the time relationships between the data edges and the master clock edge. The implementation can be done from a look-up table in a memory within the bit synchronizer 1138 or can be calculated in real time with either hard-wired logic or a fast dedicated microprocessor.



  Head-End Unit
 Figs. F-4 and F-5 are a block diagram of one of the network head-end cards of the head-end unit 1020 of Fig. F-l.



  Signals from the network broadband cable 1026 are received by receiver 1160. A carrier detect circuit 1162 provides signals to maximum likelihood detector 1164 indicating whether a carrier, and thus a transmission, is present. If no carrier is present, the pseudo-silence data source in the MLD is activated. The data itself is processed through detector 1166, low pass filter 1168, amplifier 1170 and level detector 1172.



  The resultant data is then provided to MLD 1164.



   MLD 1164 can retransmit the data through a summation circuit 1174, buffer 1176, low pass filter 1178, phase equalizer 1180 and an attenuator circuit 1182. The data is then provided to a transmitter 1184 in which the data modulates the carrier frequency in a modulator 1186, with the output being provided through buffer 1188 and diplex filter 1190 back to broadband network cable 1026.

 

   The connection to the trunks is provided through a modem bus multiplexer 1192 which provides the signals from MLD 1164 to a bus 1194. The signals from bus 1194 are provided to a connector 1196 as shown in Fig.   F-S.    Connector 1196 couples to the   IOP    card as shown in Fig. F-6.



   A clock generator circuit 1198 contains the clocking circuit shown in Fig. F-2. A PAL decode controller 1200 has logic for selecting the best clock. Fig. F-5 shows a frequency switch multiplexer 1202 for selecting the frequency channel of the particular NHC by providing an appropriate input to a frequency synthesizer 1204. Fig. F-5 also shows a reset decode  fault generator 1206 and a power supply circuit 1208.



   Fig. F-6 is a block diagram of the   IOP    card 1032 of
Fig. F-l. Each of four NHC cards as shown in Figs. F-4 and F-5 is connected via a connector 1196 to a controller/interface circuit 1210. The construction of the controller/interface circuit is the same as that used on the voice interface units as described elsewhere in this application. A phase lock loop 1212 synchronizes the   IOP    timing to that of the NHCs. A PCM highway 1214, identical to the PCM highway used in the VIUs, is coupled to a trunk data buffer 1216. This couples the data to a trunk bus 1034 as shown in Fig. F-1. The specific trunk card address is provided through a trunk address buffer 1218 and an address decode circuit 1220.



   The   IOP    is controlled by a microprocessor 1222 which has access to an EPROM and EEPROM 1224 and a DRAM 1226. An interface and clocking circuit 1228 couples DRAM 1226 to address and data buses 1230 and 1232. A clocking circuit 1234 is used to provide a clock to controller/interface circuits 1210.



   The I/O Processor Card   (IOP),    is a general purpose
CPU card used to control up to 24 full-duplex voice timeslots.



  These voice connections can be from any of the four voice channels via the four chip sets 1210 and modem buses 1196. A   1OMHz    80186 microprocessor executes software from the 512Kbytes of dynamic RAM. The 16K-bytes of EPROM allows the   IOP    to self-test itself and request to be booted, and an 8K-byte
EEPROM provides non-volatile storage of configuration information. An additional 8K of EEPROM is available. The
EPROM will also contain card serial number, date of manufacture, revision, etc. Circuit 1228 is used to provide
DRAM control, parity error interrupt control, memory write protection, memory refresh, and watch-dog timer. The Trunk
Group Bus Interface connects the   IOP    to other cards in the trunk group.



   The four chip sets 1210 each consist of two custom
LSI chips and an 8K x 8 static RAM These chip sets  communicate with each other over an internal bus. Circuits 1210 each include a Receiver/Transmitter (Rx/Tx) which interfaces to the modem serial bus on the TIU backplane. A
Packet Controller (PCTL) provides the PCM Highway consisting of 24 full-duplex timeslots for connection to trunk interfaces and server circuits. PCTL also provides   IOP    access to P-RAM, packets, tone generation, etc. A P-RAM, Packet RAM, 8K x 8 static RAM, is used for storing voice and signalling buffers.



  These buffers hold the incoming and outgoing packets as well as some commands for handshaking between the 80186 and circuit 1210. The 80186 can read and write this RAM. In addition, this RAM can be optionally stuffed with a 32K x 8 RAM with the addition of a jumper on the IOP. It should be noted that P-RAM cannot be successfully accessed without the 5.018MHz modem clocks from the backplane.



   Circuit 1228 is a custom LSI chip which provides all of the timings for DRAM control, memory refresh, data buffering, and write protection. It also includes circuitry to handle watch-dog timer and NMI generation to the 80186. It contains an error register which captures 18-bits of the address during write protect errors, and parity errors.



   The   IOP    Card provides up to 512K-bytes of parity checked dynamic RAM. RAM can be configured in 128K-byte blocks. Chip 1228 provides all the control timing, address multiplexing, memory refresh, and data buffering for the DRAM.



   All timings originate from the modem (NMCs or NHCs); the modem provides two 5.018MHz clocks in quadrature which are used by the CIC chips 1210 to recover data from the network and for internal state timing.



   The   20.072MHz    phase-lock-loop circuit receives and locks to the selected 5.018MHz clock from one of the four chips programmed to be the master. 20.072MHz is provided to a chip 1228 which returns a 6.176MHz clock to the CIC chips 1210 for the PCM Highway. Chip 1228 uses a 10.036MHz clock (20.072MHz/2) from the 80186 to synchronize its DRAM control logic.  



   The Watch-Dog Timer (WDT) function, contained in chip 1228, provides a method of detecting incorrect program execution caused by software bugs or hardware malfunction. The
WDT appears as an I/O port on the 80186's bus, and drives Non
Maskable Interrupt and RESET to the 80186 microprocessor. Once enabled, software must tickle the WDT once every two seconds to avoid a Non-Maskable Interrupt. If not tickled within two seconds after an NMI, chip 1228 will reset the 80186 microprocessor.



  Conclusion
 It can thus be seen that the present invention provides a technique for rapidly and efficiently downloading code and data to nodes in a distributed intelligence network.



   While the above is a complete description of the preferred embodiment of the invention, various modifications, alternative constructions, and equivalents may be employed. For example, while a coaxial cable is used in the preferred embodiment, fiber optic and other media could be used. Similarly, while the   TNG    function is carried out by the NBU hardware, physically separate units could be used.



   Additionally, while the preferred time domain multiplexing scheme shows the SP interval at the beginning of each frame, with two frames making up a cycle, there are other possibilities. For example, there is no absolute reason to have two SP intervals in each cycle. Nor is it necessary to have the two    .   



   Therefore, the above description and illustrations should not be taken as limiting the scope of the invention which is defined by the appended claims.  

 

   Table   A-l    - List of Abbreviations
AIU - attendant interface unit/console
BCSP - boot control signalling packet
BP - boot packet
BRSP - boot request signalling packet
CID - configuration identifier
CVP - claiming voice packet
HRU - head end retransmission unit
IE - individual extension   IOP    - I/O processor
LUA - local unique address
MAE - multiple appearance extension
MLD - maximum likelihood detector
NBU - network boot unit
NMWS - network manager workstation
PCM - pulse code modulation
PCTL - packet control circuit
PRAM - packet RAM
PUA - physical unit address
RxTx - receive/transmit circuit
SLE - system link extension
SP - signalling packet
TIM - trunk interface module
TMG - timing mark generator
TM - timing mark
VC - voice circuit
VIU - voice interface unit
VP - voice packet
VTS - voice time slot  
 Table A-2 - Packet Formats
 

   (lengths in bytes)
Timing Mark Packet   (TM)    - 10 bytes
 1 Preamble
 1 Unique Delimiter
 1 Cycle Number
 2 TMG Identification
 1 Boot Control Information (4 bits for boot channel, 3
 bits for Tx channel that corresponds to the Rx channel
 in which this   TM    was received, and one bit for an
 installation indicator)
 1 Reserved for other boot information
 2 CRC
 1 Pad   Signaling    Packet (SP) - 71   bvtes   
 3 Channel Change Pad (subject to change depending on
 modem delays)
 1 Preamble
 1 Unique Delimiter 60 Data (60 bytes fixed in h/w, but the s/w does not have
 to use all of it). Includes a link header having 6,
 10, or 14 bytes, and a transport header having 7 bytes.



   2 CRC
 3 Channel Change Pad
 1 Modem Enable/Disable Pad
Skew Signalling Packet (SSP) - (71   bvtes)   
 3 Channel Change Pad (subject to change depending on
 modem delays)
 1 Preamble
 1 same delimiter as normal SP 14 Data
 2 CRC (transmitter is turned off here) 46 Idle Time
 3 Channel Change Pad
 1 Modem Enable/Disable Pad  
Voice Packet (VP) - 19.5   bvtes   
 1 Preamble
 1 Unique Delimiter 16 2 ms worth of PCM data
 1.5 Pad
Claiming Voice Packet (CVP) - 19.5   bvtes   
 1 Preamble
 1 same delimiter as normal VP 16 Data
 1.5 Pad
Boot Packet (BP) - 19.5 bytes
 1 Preamble
 1 Unique delimiter 16 16 bytes of boot data
 1.5 Pad
Frame Format
Slop Timing Mark Signalling Slot 28 Voice Slots
 (SP or SSP) (VP, BP,

   or CVP)
 10 bytes - 1 TM Slot
 71 bytes - 1 SP Slot + 546 bytes - 28 VP Slots
 627 bytes - total (5016 bits) + Slop ( 2 bits)
 5018 bits/frame x 1 frame/ms = 5.018 Megabits/sec  
 Table A-3 - MaP of PRAM
 (addresses in bytes (hex); lengths in bytes)
Address Ranae Definition 0000 - 001F PCM Hwy Timeslot   0    Xmt Ring Buffer (32) 0020 - 003F PCM Hwy Timeslot   0    Rcv Ring Buffer (32) 0040 - 005F PCM Hwy Timeslot 1 Xmt Ring Buffer (32) 0060 - 007F PCM Hwy Timeslot 1 Rcv Ring Buffer (32) 05C0 - 05DF PCM Hwy Timeslot 23 Xmt Ring Buffer (32) 05E0 - 05FF PCM Hwy Timeslot 23 Rcv Ring Buffer (32) 0600 - 061F Transmit Silence Buffer (32) 0620 - 07FF Unused,

   reserved for future use 0800 - 0807 PCM Hwy Timeslot   0    Control Block (8) 0808 - 080F PCM Hwy Timeslot 1 Control Block (8) 0810 - 0817 PCM Hwy Timeslot 2 Control Block (8) 08B8 - 08BF PCM Hwy Timeslot 23 Control Block (8) 08C0 - 08FF Unused, reserved for future use 0900 - 093F Network Transmit Active Table (64) 0940 - 097F Network Receive Active Table (64) 0980 - 09BF Transmit Timing Mark Data Buffer (64) 09C0 - 09FF Receive Timing Mark Data Buffer (64)
OA00 - 0A7F Network Transmit SP Data Buffer (128) 0A80 - OAFF Network Receive SP Data Buffer (128)   0B00    - 0B3F Network Busy/Free Table (64) 0B40 - 0B7F Network Receive SP Hash Table (64) 0B80 - OBBF Network Claiming VP Data Buffers (64)
OBC0 - OBFF Network Transmitted CRC Buffers (64)  0C00 - OCFF Network Transmit Boot Buffer 0 (256)
OD00 - ODFF Network Transmit Boot Buffer 1 

   (256)
OE00 - OEFF Network Receive Boot Buffer 0 (256)   OF00    - OFFF Network Receive Boot Buffer 1 (256) 1000 - 103F Network Receive - PCM Timeslot Map (64) 1040 - 107F Network Transmit - PCM Timeslot Map (64) 1080 - 10FF Unused, reserved for future use.



  1100 - 11FF Gain Level Switch or Tone Buffer (256) 1200 - 12FF Gain Level Switch or Tone Buffer (256) 1F00 - 1FFF Gain Level Switch or Tone Buffer (256)
 End of 8 KB P-RAM
Additional memory may be provided for extra gain level switch or tone buffers. For example, Receive Long Tone Buffers (which can be over 60K in maximum length) are made by using consecutive   Gaii   
Level Switch/Tone Buffers.  



   Table A-4 - Boot Image File Format
 (lengths in bytes)
 2 Image ID - identifies the image type
 2 Version - specifies the version number 4
 of the program
 4 Exec. Address - specifies the program starting
 address
 2 Exec. Control - used to control the execution
 after the image is booted. If
 Exec. Control is set, the booted
 unit will start the program by
 jumping to the
 address specified by the
 Exec. Address: field. If
 Exec. Control is cleared, the
 booted unit will restart the
 boot process cycle. This
 execution control mechanism
 allows a network unit to
 receive configuration data
 images.



   2 No. of Blocks - specifies the number of memory
 blocks contained in this
 program image.



   4 Reserved 
The following are repeated for each block.



   2 Length
 2 Block Number - specifies the block sequence
 number of this block
 4 Load Address - specifies the load starting
 address of this block up to 245 Memory Image
 2 Checksum - contains the Checksum of this
 block  
 Table A-5 - Boot Request   Signalling    Packet Format
 (lengths in bytes)
 6/10/14 Link Header - source and destination addresses
 7 Transport Header 
 1 Boot Select - identifies the packet as a Boot SP
 1 Packet Type - identifies the packet type as Boot
 Request SP
 2 Image ID - identifies the type of
 program image being requested
 2 Version - A WORD, specifies the
 version number of the program
 image. A value of OxFFFF
 indicates an unspecified Version
 number.  

 

   Table A-6 - Boot Control   Signalling    Packet Format
 (lengths in bytes) 6/10/14 Link Header - source and destination
 addresses 7 Transport   Header    1 Boot Select - identifies the packet as a
 Boot SP 1 Packet Type - identifies the packet type
 as Boot Control SP 2 Channel/Frame - specifies the channel and
 frame, on which the NBU
 will download the image
 blocks 8 Timeslots - specifies the VTS's that
 will be used for the
 transmission. The VTS
 number 255 or the eighth
 value marks the end of the
 VTS list 2 Image ID - same as boot image file 2 Version - same as boot image file 4 Exec. Address - same as boot image file 2 Exec.

  Control - same as boot image file 2 Number of Blocks - same as boot image file  
 TABLE C-1
 HRU SIGNAL DESCRIPTIONS   NRXD    MODEM Receive Data is the reconstructed
 serial data which is recovered by the NHC
 and delivered to the TIU interface at a
 rate of 5.018 Mbps. The data stream is
 synchronized with the Phase 1 clock, and
 data is shifted through on the falling
 edge. The rising edge is then used as the
 sampling clock edge.



     MTXD MODEM    Transmit Data is the serial data
 accepted at the TIU interface for
 broadband transmission. The data rate is
 again 5.018 Mbps. The data stream must be
 synchronized with the Phase 1 clock, and
 data is shifted to the NHC on the falling
 edge. The rising edge is then used to
 sample the data by the NHC.



     MODEM    MODEM Transmit Enable is an active low signal
 which enables broadband transmission by
 selecting MTXD as the source of inserted data
 rather than the PSP generator. MTXE must NOT
 be active when there is valid upstream
 transmission and is ORed with the NHC's
 internal Carrier Detect to insure that this
 condition is not violated. This "Enable Lock"
 circuit is necessary since this signal not only
 applies to the auxiliary interface, and MUST
 NOT disable the NHC transmit function. Only an
 internal NHC fault signal or external NHC reset
 will disable or interrupt the downstream
 transmission.



  MACLK MODEM "A" Clock is a 5.018 MHz clock which is
 reconstructed by the NHC and then delivered to
 the TIU interface. This clock can be described
 as "Phase 1", and has a duty factor of
   50/50+5%.    The rising edge of this clock is
 used for MRxD sampling.



  MBCLK MODEM "B" Clock is a 5.018 MHz clock which is
 reconstructed by the NHC and then delivered to
 the TIU interface. This clock can be described
 as "Phase 2" or "Phase 1 + 90 degrees", and has
 a duty factor of 50/50   +5%.   



     MTLOCK-    MODEM   T1    Locked is an Open Collector active low  
 signal supplied to the TIU interface to
 indicate that the NHC is phase and frequency
 locked with either of the 40.144 MHz clocks
 NSYNCA and NSYNCB.



     FAULT    MODEM Fault is an active high signal which
 indicates an NHC failure, the signal will
 remain active until the NHC is reset by the
 IOP. While the fault signal is active, the
 outputs from the NHC are held inactive or tri
 state and broadband transmission is suspended.



     NAO-2    MODEM Address (0-2) are address lines that,
 when used in conjunction with MRST-, will allow
 static reset of the NHC card if the MODEM
 Address matches the occupied slot.



  MRST- MODEM Reset is an active low signal supplied by
 the TIU which will hold the addressed NHC in a
 reset state.



  NRFn1-3 Network Receive Frequency (1-3) are used to
 select one of eight receive frequencies,
 (upstream channels) for the   mIC    to operate on.



   Where "n" represents NHC 0-4. The receive
 frequency is selected via a rotary hex switch
 located on the TIU Backplane.



   NOTE: In the case of a Network MODEM
 Card, these switches would select the
 transmit or the upstream frequency.



  NTFnl-4 Network Transmit   Frequency    (1-4) are used to
 select one of sixteen transmit frequencies,
 (downstream channels) for the NHC to operate
 on. Where "n" represents NHC 0-4. The
 transmit frequency is selected via a rotary hex
 switch located on the TIU Backplane.



   NOTE: In the case of a Network MODEM
 Card, these switches would select the
 receive or the downstream frequency.



  NSYNCA Network Svnc Clock   "A"    is one of two 5.018 MHz
 clocks received from the TIU backplane as the
 "Master" clock.



     NSYNCAOK-    NHC   Svnc    Clock "A" OK indicates that NHC "A"
 generator is operating correctly.



     NTLocRa-    NHC "A"   T1    Locked indicates that NHC "A" is
 phase locked to the T1 source.  



  NSYNCB Network   Svnc    Clock "B" is one of two 5.018 MHz
 clocks received from the TIU backplane as the
 "Master" clock.



  NCLKBOK- NHC   Svnc    Clock "B" OK indicates that NHC "B"
 clock generator is operating correctly.



  NTLOCKB- NHC "B" Tl Locked indicates that NGC "B" is
 phase locked to the Tl source.



  P5V P5V Supplies a diode isolated voltage
 source for backplane pull up resistors and
 resistor packs. A maximum current of 50ma
 is made available.  



   Appendix i
VOICE TRANSPORT PROTOCOLS version   .0    Sage   -    3.0 Voice Transport Protocol 3.1 Document History
 Rev Date Author Comments
 1.0 25 April 85 Bob C Prototype Version
 2.0 18 April 86 Bob C
 2.0 6 June 86 Bob C
 3.0 25 June 86 Sangam 3.2 Introduction 3.2.1 Scope
The reference model of Open Systems Interconnection   (OSI),    developed by the International Standards Organization (ISO), specifies that the transport layer is responsible for the reliable end-to-end delivery of data between host entities. The transport layer performs this service for session layer entities using the services provided by the network layer.



  This specification describes a transport layer Transaction protocol, providing both best-effort and reliable datagram transfer services. These services are built upon the service exported by the link layer.



  3.2.2 Overview 3.2.2.1 Transport Services
The Interconnect Voice Transport provides the following services for the user entities.



   - "Pure"   Datagram      Deliverv    : A best effort is made to
 deliver an information (or a response) packet to the
 destination(s). If for some reason transport fails, then
 it will not notify the same to the requesting session
 entity.



   - "Reliable"   Dataaram    deliverv : A user information packet
 is delivered to the destination(s). If transport is unable
 to deliver the packet for some reason, then it will notify
 the same to the requesting session entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-2
Introduction
 - Large Data   Delivery:    A large data transfer request from a
 user entity is delivered to the destination(s) using a
 combination of both "pure" and "reliable" datagrams. If
 transport is unable to deliver the entire data without any
 error, then it will notify the same to the requesting
 session entity.

 

  3.2.2.2 Transport Interfaces
The Interconnect Voice Transport provides the above listed services by a set of commands and Indications.



  A requesting session entity will request a desired transport service by issuing a command to the transport. Transport will make indication of an incoming event, result of an earlier request (if desired by the requesting entity) to the corresponding user entity.



  3.2.3 References
 1. Interconnect Voice Transport Protocol - Revision 2.0,
 6/6/1986.



   2. Interconnect Link Protocol Version 2.02, 6/11/1986.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-3
Transport Interfaces 3.3 Transport Interfaces
A user entity requesting a transport service will use the command block interface for issuing a command. The user entity will pass a command block with relevant data for the transport use. Once a command is given to the transport, the command block will be owned by the transport. The command block processing is done   asvnchronouslv.    When the transport receives commands by a user entity by invoking one of the following function calls, return from function call does not imply the completion of the request.



  Transport will make indication to the session after completing the request (only when the session desires such notification).



  The following are the procedure interfaces provided by the transport.



  TX¯DATA¯SP¯REQ Send user data to a remote transport user
 entity. A opcode parameter in the command
 block will specify the type of data transfer
 desired.



     CANCEL DATA SP REQ    Cancel a earlier   TX DATA SP REQ    command.



  POST BUFFER Informs the transport that a buffer specified
 in the command block is available for the use
 of transport for receiving data addressed to
 this user entity.



  Transport layer will make the following indications to the local user entities.



     RX DATA SP    Transport has received a data packet for the
 user entity.



     RET DATA SP REQ    Transport was not successful in completing
 the   TX DATA SP PEQ    as desired by the user.



   The transport will return the command block
 to the requesting user entity with the ap
 propriate changes to the status field.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-4
Addressing User Entities 3.4 Addressing Transport User Entities
The link layer will receive the packets for all the addresses registered in it's address hash table and passes it to the transport layer. It is the responsibility of the transport layer to deliver them to the respective user entity. Different user entities are identified by a   TSAP ID    in the in the command block supplied by the user entity.



  It is possible that a user entity will make number requests before it receives a response from the transport. In order to identify these request the user entity will also supply another identifier to the transport. This identifier will be referred to as   TRANS ID.    A user entity will also specify this identifier in the command block.



  If a user entity is sending a response to a request from another entity then it will specify it by copying the TRANS ID in the received request into another field referred as TRANS ACK ID in the command block. If the responding user entity is sending a data transfer request (in addition to acknowledging a data receipt), then it will specify its own transaction identifier in the   TRANS ID    field.



  It must be noted that transport layer itself can be a user entity. In that case it will allocate its own identifiers for the purpose of communicating with other transport entities.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-5
Addressing User Entities 3.5 Transaction Frames
When ever a transport user entity requests for a data transfer to other user entity, the transport will prepare a transaction frame using the information supplied by the user through the command block. The format of the command block used for the data transfer purpose is shown in a Appendix. The transport layer will then use the services provided by the link layer to transmit the data on the network. If the user entity is requesting for a "reliable" data transfer, then the transport will retain the command block till a response(s) is received from the destination(s). The format of the transaction frame is shown in the figure 1.
EMI170.1     


<tb>



  TSAP¯ID
<tb>  <SEP> MDB <SEP> 0 <SEP> 0 <SEP> 0 <SEP> RACKET¯TYPE
<tb>  <SEP> TRANSAC¯ID
<tb> TRANSAC¯ACK¯ID
<tb> SEQUENCE¯NUMBER
<tb> ATTEMPT¯NUMBER
<tb> USER¯DATA <SEP> (OPTIONAL)
<tb> 
 Figure 1 A Transaction Frame
The transport layer uses the fields specified above for the following purpose.



     TSAP ID    This field identifies the user entity. Currently
 identified transport user entities   are    1)
 Session Layer, 2) Network Management, and 3)
 Transport Layer. The user entity requesting a
 data transfer will specify this field.



  MDB This field is referred to as More Data Bit. If
 set, it will indicate the receiving transport
 layer that some more data packets will arrive for
 the user entity specified with the same transac
 tion identifier.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page   3-6   
Addressing User Entities
PACKET¯TYPE This field specifies the packet delivery
 mechanism for the transport. Four bits will be
 used for this field. The transport layer will
 fill this field using the opcode specified by the
 user entity. The identified packet types are : 1.



   The Information Packet ("reliable" datagram).



   Both the Transaction Reliable   [TI(R))    and the
 Transaction Reliable with "piggyback" Acknow
 ledgement   tTI(R ACK))    will have this packet type.



   2. The Information Packet ("pure" datagram). Both
 the transaction pure datagram   (TI(P))    and the
 transaction pure datagram with "piggyback" ac
 knowledgement   (TI(PACK))    will have this packet
 type. 3. An Acknowledgement specified for the
 user entity (e.g. An acknowledgement specified
 for the session layer [TR(S   ACK))    will have this
 packet type). 4. A negative acknowledgement
 specified for the user entity. (e.g. a negative
 acknowledgement for the session layer
 [TR(R¯NACK)] will have this packet type. 5. An
 acknowledgement for the transport layer
 [TR(T¯ACK)]. 6. A negative acknowledgement for
 the transport layer [TR(T¯NACK)].



     TRANSAC ID    This field specifies the Transaction Identifier.



      A A user entity will specify this field. At a given   
 time, more than one transaction from a user
 entity may be outstanding at the transport. Each
 of the outstanding transaction will have a unique
 transaction identifier specified by the user
 entity. A user entity can have up to 255 transac
 tion identifiers. '0' is not a valid transaction
 identifier.

 

  TRANSAC ACK ID This field specifies the Transaction Acknow
 ledgement Identifier. A user entity will specify
 this field. It will be the same as a TRNSAC ID of
 a transaction which this user entity is acknow
 ledging. Note : If the user entity is making a
 data transfer also   ("piggyback"),    then it will
 have its own transaction identifier in the
 TRANSAC ID field. Otherwise it will make
   TRANSAC ID    as zero.



  SEQUENCE¯NUMBER This field for the exclusive use of transport
 layer. When transport is making a large data
 transfer using multiple packets, then it will use
 this field to identify the packet sequence num  
VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-7
Addressing User Entities
 ber. The use of this field is described in the
 command interface section (Large Data Transfer).



   Up to 65535 sequence numbers are possible.



   Transport layer will restrict this to a much
 lower number (320?) for implementation reasons.



     ATTEMPT NUMBER    It will indicate the transport transmit attempt
 number for the same transaction. Transport will
 increase this attempt number till it reaches the
 retransmit count specified by the user entity.



  USER DATA This field is specified by the user entity. In
 all single packet information transfers, this
 field will be filled by the user entity. In large
 data transfers, transport will fill this field
 using the buffer specified by the user.



  3.5.1 Transaction Information (TI) Prames
When ever a user entity initiates a data transfer by making a   TX DATA SP REQ,    the transport will create transaction frame(s) with appropriate entries and then make a transmit request to the link layer with a pointer to the entire command block. These frames will have a packet type of TI(R) or   TI (R¯ACK)    or   TITS)    or
TI(P¯ACK) as desired by the user entity. Transport may or may not request the link layer for a notification of successful transmittal of a packet.



  When ever a user entity request for TI(R) or TI(R¯ACK) type of packet transfer, transport will have the additional responsibility of notifying the requesting user entity about the success or failure of the request. A success indication generally indicates that data is received by the user entity without any errors. In addition it may carry a "piggyback" data (e.g.



     TI(R ACR)    or TI(P¯ACK)). In addition whenever a user entity requests for a "reliable" transfer, it may also request for number times a packet as to be retransmitted before notifying a user entity and a time interval before each of these retransmit attempts. These parameters will be specified by the user entity in the command block.



  When ever a user entity requests for a "reliable" data transfer the transport will maintain the command block in its internal retransmit table. This entry will be cleared either due to an acknowledgement from a remote entity or due to the final time-out after exhausting the retransmit count.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-8
Addressing User Entities
If the acknowledgement packet has a "piggyback" data (   TI(R¯ACK)    or TI(P ACK) then transport will release the command block from the retransmit table and pass the information packet to the user entity by making RX DATA SP indication.



  In the case of time-out condition, transport will check for the retransmit counter. If it is not zero, it will initiate another transmit for the same transaction. If the counter is zero, it will return the command block to the user entity with the appropriate status indication.



  3.5.1.1 single Packet Transfer
Majority of the call processing signaling information will be transmitted in single packet called Signaling Packet (SP). Whenever a user entity request for a single SP transfer, it will copy its data in the USER DATA area in the command block and will specify the desired control. The transport will transmit this as one of the Transaction Information frame   tTI(R)    or TI(P) or
TI(R¯ACK) or   TI(PACK))    as desired by the user entity.



  3.5.1.2 Large Data Transfer
When a user indicates a large data transfer request by calling   TX DATA SP PEQ    procedure with a command block pointer. When this request is made the user entity will not copy the data into
USER DATA area in the command block. Instead, it will have a pointer in the command block which will point to the user data area. The user entity will also specify the length of the user data. In the first release of Interconnect product, the transport will restrict this length to 12k (approx). If a user entity has to transfer a data larger than 12k it will have to initiate multiple large data transfer requests.



  Before making a large data transfer attempt, the receiving transport must have a buffer posted by the user entity consuming the data. The user entity which is consuming the data will have to -issue a POST BUFFER command to its transport. It is possible that a large data transfer transfer initiation can either come from the user entity consuming the data or the user entity serving the data. In either case it is the responsibility of the communicating user entities to make suitable negotiations using single SPs and ensure that receiving user entity has posted a buffer to its transport before the server entity issues   TX¯DATA¯SPPEQ    command for a large data transfer.



  When the transport layer receives the large data transfer request, it will put this command block into a list of large data transfer requests which are already pending. Then it will prepare command blocks as desired by the user entity (note : only TI(P) packets are allowed for data transfer) and give them to the link  
VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-9
Addressing User Entities layer. Transport will copy the data from the user specified buffer area into the   USER¯DATA    area of the command blocks in sequence. It also tags a sequence number of the packet into the the SEQUENCE NUMBER field in the transaction frame.



  It is apparent that we will not have enough buffers to accommodate transfer of too many packets at a time. To solve this, transport layer will have a local flow control mechanism. The scheme followed by the transport will be simple. When ever transport issues five (?) transmit commands in a row to the link layer, it will ask the link layer to notify the completion of the fifth command. When transport initiates the transfer first time it will issue ten (?) transmit commands in a row. There afterwards, when ever a transport gets a notification of the completion of a transmit from the link, it will initiate five more transmit commands. This will be continued till transport is left with data sufficient to fit in a single SP. Note all these packets will have same transaction number and transport will tag a
SEQUENCE NUMBER and MDB bit is set.

  It should also be noted that all these packets are sent as   TI (P)    type packets.



  When the transport has to send last packet, it will reset MDB bit and tags the appropriate SEQUENCE NUMBER and transmits it as a
TI(R) type of packet.



  The receiving transport will copy the data into the allocated buffer (through the earlier POST BUFFER command) using the   SEQUENCE NUNBER    as index to the buffer storage area. It will also remember the sequence number of the packet it received correctly.



  If the transport receives a out of sequence packet, it will mark the same in a   =      man.    When the transport receives a packet with
NDB bit reset, it will send the entire bit map data in a TI(R) packet.



  When the sending transport receives the bit map packet, it will will copy the same into the user data area in the command block area given by the user entity in the TX¯DATA¯SP¯REQ command. If other receivers send bit man before the set time out, then   transport will make a LOGICAL OR of these f bit mans. At the end of    time-out, the transport will check for the retransmit count in the command block. If it is zero, then it will make the appropriate status change and return the command block to the user entity. If the retransmit count is not zero, then transport will uses the bit map to determine the data packets required to be retransmitted and will transmit them with appropriate   SEQUENCE NUMBER    as described earlier. Transport layer will use the ATTEMPT NUMBER field to indicate a new transmit attempt. 

  Each time it starts a new transmitting sequence it will increment this field (Initial value   =1,    Maximum Value   =    Retransmit Count). The   bit    man is restricted to the user data area available in a single packet ( approx 40 bytes, 40 x 8   =    320 SPs which will give about  
VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-10
Addressing User Entities 12.5 K data transfer capability).



  The receiving stations will check for the attempt number. When the transmit sequence with the attempt number reaches a maximum, it will return the received data to the user entity using the
RX DATA SP indication. The data pointer will now point to the buffer posted by the user in the POST BUFFER command. The status in the command block will inform the user entity if the data was received correctly. If the data is not received correctly   bit      map    in the user data area will indicate the SEQUENCE¯NUMBER of packets which were not received.



  It is possible that multiple user entities like to receive a large data transfer simultaneously. If the data transfer is initiated by the server (e.g. periodic update of ARS table), then it is the servers responsibility make reliable negotiations with the consumer(s) before initiating large data transfer. However, it is possible that a server might receive large data transfer requests from several consumers (for the same data) at or about the same time (This will be a common case at power up time of
TIMs). Hence it is essential for the units requiring data to listen for any such request(s) currently going on the network. To facilitate this, consumers will be listening for a CRSP (configuration request SP) from other consumers addressed to a server address or a CCSP (configuration control SP) addressed to a group address.

  If they see either of these packets, then it will post a buffer and will get ready to receive the data. If a consumer does not see any of these packets for a period of time (?) after power up it will issue a new CRSP. The server after receiving a CRSP will delay its response for a period of time (30 sec.?) and then starts data transfer with   TX DATA SP REQ    command for a large data transfer. Once a data transfer is complete, a consumer station will remove these server and group address from its hash table.



  This arbitration is used for reducing the probability of SP collisions which might occur during power up time. The scheme suggested here is for implementation of a user entity (e.g. net management) which may have to manage multiple large data transfer requests at the same time. This is included here for the purpose of illustrating a large data transfer example. By no means this dictates the user entity to follow this scheme. What transport layer assumes is a POST BUFFER command is initiated at the consumer before a TX DATA¯SP REQ is made at the server.



  3.5.2 Transaction Response (TR) Frames
The Interconnect Voice Transport allows responses for a "reliable" single packets to be generated by either transport or user entities. If a user entity request the transport to transmit a response frame (e.g. session may request for   TR(S¯ACX)    or   TR(S¯NACK)    packets types), then the receiving transport will pass this packet to the user entity. If the response packet is gener  
VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-11
Addressing User Entities ated by the transport (e.g. TR(T¯ACK) or   TR(T NACK)    type of packets), then it will not be passed up to the user entity. In either case, no user data will be allowed in the user data area.



  Depending on the type of packet, the receiving transport will insert '0' for ACK type packets and 'OFFH' for NACK type of packets in the first byte of user data area and then passes it to the user entity. The response frames are sent as "pure" datagrams.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-12
Command Interfaces 3.6 TRANSPORT   COMMAND    INTERFACES 3.6.1   TX DATA SP REQ      COMMAND   
A user entity will prepare a command block and will pass a pointer to this block by calling a transport procedure   TX DATA SP REQ.    The format of the command block structure is shown in the Appendix. The parameters which a user entity will specify before giving this command are described below.



  OPCODE The opcode for this command. Specifies the
 transmit mode and packet type for the
 transport layer. Different opcodes for this
 command are described in this section
 later.



  STATUS Before giving the command block to the
 transport, the user entity will set this
 field to '0'. If transport has to return
 the command block to the user entity using
   RETDATA¯SPPEQ,    then it will modify this
 field to indicate the execution result for
 the   TX DATA SP REQ    command. The various
 status codes returned are described later
 in this section.



  TSAP¯ID The user entity will identify itself by
 setting this field. If an invalid user
 entity is set, transport will not accept
 the command.



     TRANSACTION ID    The user entity will set this field. If the
 same user entity gives TX   DATA SP PEQ   
 command with a TRANSACTION ID which is
 already existing in the transport
 retransmit table, transport will not accept
 the command.



  TRANSACTION ACK ID If a user entity (or transport) is acknow
 ledging a received transaction, then it
 will fill this field with the received
   TRANSACTION ID    before giving a command to
 the transport.



  RETRANSMIT COUNT The user entity will specify how many times  
VOICE   TRANSPORT    PROTOCOLS Version 3.0 Page 3-13
Command Interfaces
 a packet has to be retransmitted before
 receiving a response or making a
 RET   DATA SP PEQ    indication to notify the
 failure.



     DATA BUFFER PTR    User entity indicates the pointer to a data
 buffer area. This is valid only when the
 large data transfer is specified in the
 opcode field.



     DATA BUFFER LTH    User entity indicates the length of the
 data area pointed by the DATA BUFFER AREA.



   It is valid only when the opcode specifies
 a large data transfer.



  PARTITION It indicates the link layer that only the
 SP PARTITION in this field must be used for
 transmitting this packet.



  NUMBER OF CHANNELS It indicates the link layer that on how
 many   RF    channels this packet has to be
 transmitted.



     LIST¯OF¯OHAAEL(NAX)    It is an array of length equal to the
 maximum number of   RF    channels in the Inter
 connect Network. The user entity will
 indicate the channels on which this packet
 has to be transmitted. Each member in the
 array specifies one logical channel. Link
 layer will convert the logical channel
 number into the physical channel number
 before transmitting the packet.

 

     DEST ADDR MODE    It specifies the addressing mode for the
 destination. Link and hardware will use
 this field to deliver the packet to proper
 destination. It also specifies whether 16
 bit or 48 bit addressing mode being used.



   It is used for interpreting the source
 address field.



     SOURCE ADDR MODE    It specifies the addressing mode for the
 source. The receiving node will use this
 field to interpret the address field.  



  VOICE TRANSPORT PROTOCOLS Version   3.0    Page 3-14
Command Interfaces
DESTINATION ADDR The destination address for which this SP
 is intended for.



  SOURCE ADDR The source address for the sending user
 entity.



  SP BUFFER PTR Points to the user data area in the command
 block.



  SP BUFFER OFFSET If the command specified is not for large
 data transfer, this indicates the offset to
 the user data area.



  In general all the above fields have to be set by the user entity before giving the transport command. The user entity will call the following   procedure   
 u¯short TX¯DATA¯SP¯REQ(cmd¯blk)    cod blk ptr *cmd blk:    where the   cad bulk    points to the user specified command block. If for some reason transport can not accept the user command it will be returned in the function return status. The execution status is returned to the user either by RX DATA SP or RET DATA SP REQ using indications later. In the subsequent sections various opcodes for this command are described. Only the parameters which are specific to each opcode are mentioned here.  



  VOICE TRANSPORT PROTOCOLS -Version 3.0 Page 3-15
Command Interfaces 3.6.1.1 SEND¯SP¯R
This opcode specifies that transport must send the user data in the command block as a "reliable" datagram. If this opcode is specified then the following fields are tested before returning the function status.



  TSAP¯ID This field must have a valid user entity.



  TRANSACTION ID This field must have a identifier which is
 not already present in the transport
 retransmit table.



  TRANSACTION¯ACK ID This field must be set to   'O'.   



  RETRANSMIT COUNT This field specifies how many times this
 packet has to be transmitted before notify
 ing the user entity. This field must have a
 non-zero value for this opcode.



  TX¯DATA¯SP¯REQ function call will return one of the following values.



     COMMAND¯ACCEPTED    Transport layer has accepted the command
 for processing.



     ILLEGAL TSAP ID    The user entity is not known to the
 transport.



     DUPLICATE TID    The transaction identifier specified is
 already active in the transport.



  NO RETRANSMIT Retransmit count is not specified.



     TACKID NOT ZERO    The transaction ack identifier is not zero.



  If the transport layer accepts the command for processing, it will notify the result of the command through   RX DATA SP    or   RET DATASPPEQ    indications.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-16
Command Interfaces 3.6.1.2   SEND¯SP¯P   
This opcode specifies that transport must send the user data in the command block as a "pure" datagram. If this opcode is specified then the following fields are tested before returning the function status.



  TSAP¯ID This field must have a valid user entity.



  TRANSACTION ID This field must have a identifier which is
 not already present in the transport
 retransmit table.



  TRANSACTION ACK ID This field must be set to 'O'.



  TX¯DATA¯SP-REQ runction call will return one of the following values.



  COMMAND¯ACCEPTED Transport layer has accepted the command
 for processing.



     ITt9GAL TSAP ID    The user entity is not known to the
 transport.



  DUPLICATE TID The transaction identifier specified is
 already active in the transport.



     TACKID NOT ZERO    The transaction ack identifier is not zero.



  After completing the command processing, transport layer will not make any indications to the user entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-17
Command Interfaces 3.6.1.3 SEND¯R¯ACK
This opcode specifies that transport must send the user data in the command block as a "reliable" datagram. If this opcode is specified then the following fields are tested before returning the function status.



  TSAP¯ID This field must have a valid user entity.



  TRANSACTION ID This field must have a identifier which is
 not already present in the transport
 retransmit table.



  TRANSACTION¯ACK¯ID The user entity will copy the
 TRANSACTION ID from a received message to
 which it is sending this response.



  RETRANSMIT¯COUNT This field specifies how many times this
 packet has to be transmitted before notify
 ing the user entity. This field must have a
 non-zero value for this opcode.



     TX¯DATA SP REQ    function call will return one of the following values.



     COMMAND ACCEPTED    Transport layer has accepted the command
 for processing.



     Irr9GAL¯TSAP ID    The user entity is not known to the
 transport.



     DUPLICATE TID    The transaction identifier specified is
 already active in the transport.



  NO RETRANSMIT Retransmit count is not specified.



  If the transport layer accepts the command for processing, it will notify the result of the command through RX¯DATA¯SP or
RET¯DATA¯SP¯REQ indications.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-18
Command Interfaces 3.6.1.4    END-st P ACR   
This opcode specifies that transport must send the user data in the command block as a "pure" datagram. If this opcode is specified then the following fields are tested before returning the function status.



  TSAP¯ID This field must have a valid user entity.



  TRANSACTION ID This field must have a identifier which is
 not already present in the transport
 retransmit table.



  TRANSACTION¯ACK¯ID The user entity will copy the
   TRANSACTTON ID    from a received message to
 which it is sending this response.



  TX¯DATA¯SP¯REQ function call will return one of the following values.



  COMMAND ACCEPTED Transport layer has accepted the command
 for processing.



     ILLEGAL¯TSAP¯ID    The user entity is not known to the
 transport.



  DUPLICATE TID The transaction identifier specified is
 already active in the transport.

 

  After completing the processing of the command, the transport layer will not make any indications to the user entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-19
Command Interfaces 3.6.1.5 SEND¯ACK¯RSP
This opcode will specify the transport that user is acknowledging a earlier transaction in a affirmative manner. The user entity will not fill any data into the user data area. Transport layer
Only field user is going to specify for this command is the
TRANSACTION¯ACK¯ID.



  TX¯DATA¯SP¯REQ function call will return one of the following values.



  COMMAND ACCEPTED Transport layer has accepted the command
 for processing.



     ILLIEGAL TSAP ID    The user entity is not known to the
 transport.



  After completing the processing of the command, the transport layer will not make any indications to the user entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-20
Command Interfaces 3.6.1.6   SEND¯HACK¯RSP   
This opcode will specify the transport that user is acknowledging a earlier transaction in a non-confirmative manner. The user entity will not fill any data into the user data area. Transport layer Only field user-is going to specify for this command is the
TRANSACTION ACK ID.



     TX DATA SP REQ    function call will return one of the following values.



  COMMAND¯ACCEPTED Transport layer has accepted the command
 for processing.



  ILLEGAL¯TSAP¯ED The user entity is not known to the
 transport.



  After completing the processing of the command, the transport layer will not make any indications to the user entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-21
Command Interfaces 3.6.1.7   GEND LARGE IIATA   
This opcode specifies that transport must send the data pointed by the DATA BUFFER PTR in the command block using more than one
SPs. If this opcode is specified then the following fields are tested before returning the function status.



  TSAP¯ID This field must have a valid user entity.



  TRANSACTION ID This field must have a identifier which is
 not already present in the transport
 retransmit table.



  TRANSACTION ACK ID This field must be set to   'o'.   



  RETRANSMIT COUNT This field specifies how many times this
 packet has to be transmitted before notify
 ing the user entity. This field must have a
 non-zero value for this opcode.



     DATA BUFFER PTR    This filed will point to a data buffer area
 outside the command block.



     DATA BUFFER LTH    This field specifies the length of the data
 buffer area.



     TX¯DATA¯SP REQ    function call will return one of the following values.



  COMMAND ACCEPTED Transport layer has accepted the command
 for processing.



  ILLEGAL¯TSAP¯ID The user entity is not known to the
 transport.



  DUPLICATE TID The transaction identifier specified is
 already active in the transport.



  NO RETRANSMIT Retransmit count is not specified.



     TACKID NOT ZERO    The transaction ack identifier is not zero.  
VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-22
Command Interfaces
If the transport layer accepts the command for processing, it will notify the result of the command through   RET DATA SP REQ    indication.  



  VOICE   TRANSPORT    PROTOCOLS Version 3.0 Page 3-23
Command Interfaces 3.6.2   CANCEL DATA aP REQ   
This command specifies transport layer to cancel an earlier
TX¯DATA¯SP¯REQ command. The user entity will specify this command by calling the following procedure
 u short   CANCEL DATA SP REQ    (transaction¯id); where transaction id is the identifier for the TX¯DATA¯SP¯REQ command given by the user entity.



  This function call will return one of the following values.



  CANCEL DONE Transaction is cancelled successfully.



     MARKED FOR CANCEL    Transport has marked the transaction for
 canceling.



  INVALID TRANSACTION The specified transaction does not exist in
 the transport layer.



  If the transport reports the MARKED¯FOR¯CANCEL status, it will not report to the user entity after completing the command.



  However the responses received for this transaction after registering this command will be discarded by the transport layer.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-24
Command Interfaces 3.6.3 POST BuFFER
This command specifies the transport layer that a buffer is available for receiving a large data transfer. A user entity will call the following function with a pointer to the buffer area and the length of the buffer.



   u short POST¯BUFFER(buf¯ptr, buf¯lth, user id);
 DATA¯BUFFER¯PTR *buf¯ptr; where buf¯ptr points to a user buffer area, buf lth indicates the length of the buffer and user¯id is the TSAP¯ID of the user entity.



  The POST BUFFER function call will return one of the following values.



  POST¯BUFFER¯OK Transport accepts the buffer for receiving
 the data addressed to the user entity.



     INVALID¯USER¯ID    The TSAP¯ID supplied does not belong to a
 valid transport user entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-25
Transport Indications 3.7 TRANSPORT INDICATIONS
As discussed earlier transport will make the following indications to the higher layer.



  3.7.1   R S¯DATA¯|;P   
When a data packet arrives for a valid user entity, transport layer will indicate the higher layer by calling this function with a pointer to the command block (which it received from the lower layer). This procedure could be part of transport layer so that it can make additional range checks on extensions and send the command block pointer to the appropriate user entity. In addition RX DATA SP, function will duplicate the command block received   aRd    send it multiple user entities with same identifier
 (This required for supporting multi ported DOGHOUSE. It is possible that different Spikes connected to a multi ported Doghouse might belong to a multi appearance extension or hunt group. Hence it may be required to send certain request packets to several session entities controlling individual Spikes).



     RX DATA SP    procedure will be part of transport task. It will interface with the user entity using a mailbox supplied by the user entity.



  3.7.2 RET¯DATA¯8P¯REQ   If    transport can not complete a   TX DATA SP REQ    command processing, it will make the appropriate status change in the command block and will return the command block to the user entity using the mailbox provided by it in the command-block.

 

  The status field in the command block will have one the following values.



     RESPONSE TINEOUT    Expected responses did not arrive before
 the elapse of specified timeout.



  TRANSMIT¯FAILURE Transport was not able to transmit before
 the elapse of the specified time out.



  NO BUFFER POSTED Receiving transport has no receive buffer
 to complete the large data transfer re
 quest.



     LARGE DATA RCV OX    Transport did receive a large data transfer
 successfully and data is now available in
 the data buffer posted by the user entity.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-26
Transport Indications
LARGE¯DATA¯RCV¯NOT¯OK Transport received an incomplete large data
 transfer. The user data area in the command
 block now contains the bit mar of the
 packets which were not received.



  LARGE¯DATA¯TX¯OK Transport did complete a earlier large data
 transfer command (through TX¯DATA¯SP¯REQ
 command) successfully.



     LARGE DATA TX NOT OK    Transport did not complete the large data
 transfer command successfully. The user
 data area in the command block now contains
 the bit map of the packets which were not
 successfully transmitted.  



  VOICE TRANSPORT   PROTOCOLS    Version 3.0 Page 3-27
Transport Indications 3.8 8ervices Imported From Link Layer
Transport utilizes the following services provided by the link layer.



     SEND SP    This service allows transport to transmit a Signaling
 Packet on the specified channels once.



     CANCEL SUP    This service allows transport to cancel a earlier
 SEND¯SP request.



  The interfaces to these functions are described in the Interconnect Link Layer Protocol specifications.  



  VOICE TRANSPORT PROTOCOLS Version 3.0 Page 3-28
Transport Indications 3.9 Voice Related Interfaces
Link layer provides interfaces required for management of the voice circuits and tone buffers. These interfaces are transparent to the transport layer. A user entity will directly access these services from the link layer. These interfaces are described in the Interconnect Link Layer Protocol specifications.  



  VOICE TRANSPORT PROTOCOLS revnum A-l
Transport Indications
 APPENDIX A
 A.1.0 Command block For   TX¯DATA¯SP¯REQ    Command typedef struct   cmd blk (   
 struct cmd blk *pFlink; /* Pointer for buffer manager */
 struct   cmdl blk    *pBlink; /* Pointer for buffer manager */
 struct   timer str    *timer¯str; /* Pointer to a timer structure */
 byte Tr¯opcode; /* Transport Command Opcode */
 byte Tr Status; /* Transport status */
 byte tsap¯id; /* Transport user identifier */
 byte resp mbox; /* Transport Response Mail Box */
 byte   trnasaction    id; /* Transaction identifier */
 byte transaction ack id; /* Transaction ack identifier */
 byte retransmit count;

   /* Retransmit counter for transport*/
 byte   attempt counter:    /* Attempt counter for transport */
 word sequence counter; /* Sequence Counter for transport */
 word data¯buffer¯ptr; /* Pointer to data buffer area */
 word data¯buffer¯lth; /* Length of data buffer area */
 byte link¯rsp¯type; /* link response type */
 byte link¯rsp¯mbox; /* link will return here */
 byte link status; /* link will return status here*/
 byte partition; /* SP partition for transmit */
 byte num¯of¯channels; /* No of channels to transmit on */
 byte tx¯chan[MAX¯CHAN]; /* Channel identifier array */
 byte tx¯chan[MAX¯CHAN]; /* Transmit status on each channel */
 byte dest¯addr¯mode, /* Destination Addressing mode */
 byte src¯addr¯mode; /* Sorce addressing mode */
 stnid dest¯addr; /* Destination Address */
 stnid source¯addr; /* Source Address */
 byte rcv¯chan;

   /* Channel on which SP was received */
 byte rcv¯frame¯num; /* Frame on which SP was received */
 PACKET *psp¯buffer; /* SP buffer pointer */
 byte *psp¯offset; /* offset of the data buffer */
 word length; /* length of data from offset */
 byte SP¯buffer[]; /* SP buffer area */
 ) CMD¯BLK;  
 VOICE TRANSPORT PROTOCOLS
 TABLE OF CONTENTS 3.0 Voice Transport Protocol (Version 3.0) ................. 3-1
 3.1 Document History .................................... 3-1
 3.2 Introduction ........................................ 3-1
 3.2.1 Scope ......................................... 3-1
 3.2.2 Overview ....................................... 3-1
 3.2.2.1 Transport Services ........................ 3-1
 3.2.2.2 Transport Interfaces ...................... 3-2
 3.2.3 References ............................... 3-2
 3.3 Transport Interfaces ..........................

   3-3
 3.4 Addressing Transport User Entities ................. 3-4
 3.5 Transaction Frames .................................. 3-5
 3.5.1 Transaction Information (TI) Frames ............ 3-7
 3.5.1.1 Single Packet Transfer .................... 3-8
 3.5.1.2 large Data Transfer ....................... 3-8
 3.5.2 Transaction Response (TR) Frames ............... 3-10
 3.6 TRANSPORT COMMAND INTERFACES ........................ 3-12
 3.6.1 TX¯DATA¯SP¯REQ COMMAND ......................... 3-12
 3.6.1 SEND¯SP¯R ................................. 3-15
 3.6.1.2 SEND¯SP¯P ................................. 3-16
 3.6.1.3 SEND¯SP¯R¯ACK ............................. 3-17
 3.6.1.4 SEND¯SP¯P¯ACK ............................. 3-18
 3.6.1.5 SEND¯ACK¯RSP .............................. 3-19
 3.6.1.6 SEND¯NACK¯RSP ............................. 3-20
 3.6.1.7 SEND¯LARGE¯DATA ...........................

   3-21
 3.6.2 CANCEL¯DATA¯SP¯REQ ............................. 3-23
 3.6.3 CANCEL¯BUFFER .................................... 3-24
 3.7 TRANSPORT INDICATIONS ............................... 3-25
 3.7.1 RX¯DATA¯SP ..................................... 3-25
 3.7.2 RET¯DATA¯SP¯TEQ ................................ 3-25
 3.8 Services Imported From Link Layer ................... 3-27
 3.9 Voice Related Interfaces ............................ 3-28
APPENDIX A: Command block   Por    TX¯DATA¯SP¯REQ Command ..... A - 1  
 Appendix   2   
DOGHOUSE/SPIKE DRIVER   ¯      zaae      0-I    1.0   Doghouse/Bpike    Driver Transport Layer 1.1 Introduction
This document describes the transport layer of the Spike Driver.



  All of the processing described herein is executed on the
Doghouse side of the Spikelink.



  1.1.1 Overview
At leash every 50 ms, the transport layer will poll Spike to see if he has any data for the Doghouse. In order to reduce the amount to real-time necessary to service the Doghouse-to-Spike   link, the Doghouse will only request an acknowledgement from
Spike once a second, or prior to the sending of data to the   
Spike.



  All data messages received from Spike will be unpacked from the   packet and individually buffered until requested by one of the session tasks. When a session task does request Spike informa-    tion, transport will place the message in the mailbox associated with the requesting task.

 

  The session layer will pass messages for Spike to the transport via a subroutine call. The transport layer will pack as many   messages as possible into a packet. At the end of each polling cycle, transport will check to see if there is a packet to be    sent to Spike; if so, transport will pass the packet to the link layer for delivery.



  When describing data transfer directions, uplink refers to Spiketo-Doghouse messages while downlink is used for- the Doghouse-to
Spike transfers.



  1.1.2 References
 1. Spike Leash Workina Document External Design SPecification
 - Version 1.00, 16 August 1986
 2. "Doghouse/Spike Driver Interface", 23 September 1986  
DOGHOUSE/SPIKE DRIVER Page 1-2 1.2 Link to Transport Protocol
The transfer of information between Spike and the Doghouse is based on the exchange of serial packets using a master-slave relationship. The Doghouse is always the master and Spike is always the slave.



  The master initiates information exchange every 50 ms by polling the slave. As previously mentioned, the Doghouse may poll Spike with one of two different messages. One poll requires Spike to return an acknowledgement, a data packet, or a busy message. This type of POLL will be referred to as an ACKed POLL. The second type of poll, an ACKless POLL, does not require any response from
Spike but a data packet will be accepted if sent.



  After an ACKed POLL, the master will expect three possible actions from the slave.



   1. Spike will return an acknowledgement   (ACK)    indicating that
 he does not have any data to pass to the Doghouse.



   2. Spike will return a data packet to the Doghouse. The master
 will acknowledge the data packet and Spike will acknowledge
 the acknowledgement.



   3. The slave will indicate that he is busy and can not accept
 data from the Doghouse. In this case, the master should
 wait until the next polling cycle before attempting any
 further contact with Spike.



  After each of the first two events listed above, the master may send a data packet to Spike which will be followed by an acknow- ledgement from the slave. If the Doghouse does not have any data to send Spike, he simply waits for the next polling cycle. It is important to note that the master must always send an ACKed POLL to the slave before sending a data packet to Spike.



  After an ACKless POLL, the master will expect two possible actions from the slave.



   1. Spike will return a data packet to the Doghouse. The master
 will acknowledge the data packet and Spike will acknowledge
 the acknowledgement.



   2. The master will timeout waiting for a packet from Spike.



   Since the Doghouse is not really expecting anything from
 Spike anyway, this condition will not be considered an
 error.  



  DOGHOUSE/SPIKE DRIVER Page 1-3   1.2.1      Packet    Passing Mechanism
Packets are passed to Spike by making a request for input/output (RIO) through a custom device driver. Since Spike may have a packet to return to the Doghouse on an RIO call, a receive data buffer will be included in each call to the device driver. The addition of the receive buffer eliminates the need for two RIO calls (one to send a packet and one to receive a packet) for each communication transaction. In addition, a packet to send to
Spike, a send packet length and a receive packet timeout will also be include in the RIO call.



  When an RIO command completes, the device driver will set an event flag and place a value in a state variable. The event flag will signal the completion of the command, while a state variable will be used to show the status of the command upon completion.



  Possible values for the command status flag include, command completed successfully, timeout error, checksum error, an error in request parameters, or another send request before the previous request completed.  



  DOGHOUSE/SPIKE DRIVER Page 1-4 1.2.2 Typical Data Transfer Sequences
Master Slave
EMI199.1     


<tb> POLL <SEP> ----- >  <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> DATA
<tb>  <SEP> ACK <SEP> ------- > 
<tb>  <SEP>  < ------- <SEP> ACK
<tb> DATA <SEP>    ------- >     <SEP> (Master <SEP> sends <SEP> data <SEP> to <SEP> Slave)
<tb>  <SEP>  < ------- <SEP> ACK
<tb> 
Master Slave
EMI199.2     


<tb> POLL <SEP> ------- >  <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> ACK <SEP> (Slave <SEP> has <SEP> no <SEP> data <SEP> to <SEP> send)
<tb> DATA <SEP>    ------- >     <SEP> (Master <SEP> sends <SEP> data <SEP> to <SEP> Slave)
<tb>  <SEP>  < ------- <SEP> ACK
<tb> 
Master Slave
EMI199.3     


<tb> POLLNA <SEP> ------- >  <SEP> (Master <SEP> polls <SEP> Slave 

   <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> DATA
<tb>  <SEP> ACK <SEP> ------- > 
<tb>  <SEP>  < -------ACK
<tb>  <SEP> (Master <SEP> has <SEP> no <SEP> data <SEP> to <SEP> send)
<tb> POLLNA <SEP>    ------- >  <SEP>     <SEP> (Master <SEP> polls <SEP> Slave <SEP> at <SEP> next <SEP> interval)
<tb> POLLNA <SEP>    ----1-- >     <SEP> (Master <SEP> polls <SEP> Slave <SEP> at <SEP> next <SEP> interval)
<tb> 
Master Slave
EMI199.4     


<tb> POLL <SEP>    ------- >     <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>     < -------    <SEP> BUSY <SEP> (Slave <SEP> indicates <SEP> that <SEP> it's <SEP> busy)
<tb>  <SEP> (Master <SEP> waits <SEP> for <SEP> next <SEP> poll <SEP> interval)
<tb> POLL <SEP>    ------- >     <SEP> (Master <SEP> polls <SEP> 

   Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> DATA <SEP> (Slave <SEP> is <SEP> no <SEP> longer <SEP> busy)
<tb>  <SEP> ACK <SEP> ------- > 
<tb>  <SEP>  < -------ACK
<tb> DATA <SEP>    ------- >     <SEP> (Master <SEP> sends <SEP> data <SEP> to <SEP> Slave)
<tb>  <SEP>  < ------- <SEP> ACK
<tb>   
DOGHOUSE/SPIKE DRIVER Page 1-5 1.2.3 Packet Format
The packet type (POLL, ACK, etc.) is included in the packet header. The general format of a packet is shown below:
EMI200.1     


<tb>  <SEP> 7 <SEP> 6 <SEP> 5 <SEP> 4 <SEP> 3 <SEP> 2 <SEP> 1 <SEP> 0
<tb>  <SEP> PID <SEP> Control
<tb> Message <SEP> Length
<tb>  <SEP> Message <SEP> Body
<tb> (if <SEP> Data <SEP> type)
<tb> Checksum <SEP> LSB
<tb> Checksum <SEP> MSB
<tb> 
Maximum   48    bytes
Where:
PID (4 bits) - is the Protocol ID field. 

  This field is used to identify the protocol used for the exchange of data. The validation of this field is a requirement for data exchange. In the future, when multiple protocols are specified, some protocol negotiation will be required based on the PID. For first release, this field will be   Olh.   



  Control (4 bits) - is the control field. This field identifies the packet type. Control field values are:
 00 - DATA(0)
   Ol    - DATA(1)
 02 -   POLKA    (ACKless POLL)
 03 - POLL (ACKed POLL)
 04 - ACK
 05 - BUSY
 06-OFh - Undefined and not used
POLLNA, POLL, ACK, and BUSY packets are control packets and therefore have no message body and a message length of zero. The use of the two different forms of the DATA message is explained in the section on Data Packet Integrity.  



  DOGHOUSE/SPIKE DRIVER Page 1-6
Message Length (1 byte) - is the length (in bytes) of the body of the message. This does not include protocol header or trailer fields such as PID, control, length, or Checksum. For first release, the maximum value of this field is 44.



  Message Body (0 to 44 bytes) - is the data portion of the packet and is only valid for DATA packets. The region is a variable length field which contains information used by higher level communications layers. Refer to the section on Message Unpacking  & Buffering for a more complete description of this field.



  Checksum (2 bytes) - is the mathematical summation of all bytes in the packet not including the checksum itself. The checksum is calculated and checked in the link layer (device driver).



  1.2.4 Reliability
Reliable transport is ensured through retransmission of suspected corrupt packets. Packets are considered corrupt if the device driver detects an error. Examples of driver detected errors include: a timeout before the return packet is received, or an inconsistency between the calculated checksum of a received packet and the checksum field of the packet.



  Although timeouts could occur due to errors in either the
Doghouse or Spike, the master has no way of distinguishing one from the other. In most timeout situations, the previous packet will be retransmitted to Spike two more times in the hope that the slave will respond. If a correct response is not obtained after three attempts, the Doghouse will reset the Spikelink driver, log a link error and return to its polling state. The exception to this immediate retry scheme applies to data packets.



  If a data packet cannot be delivered, the Doghouse will immediately return to its polling cycle (ACKed POLLS) and wait for the next available opportunity to send the data packet to Spike.



  If the Doghouse cannot deliver a data packet after three attempts, the message will be dropped, the Spikelink driver will be reset, and a link error will be logged.



  Invalid or unexpected response packets from Spike will cause the
Doghouse to immediately return to the polling state in order to avoid any potentially confusing information exchanges. For example, the Doghouse POLLs Spike and correctly receives a DATA packet, which the Doghouse acknowledges. If Spike were then to erroneously send another DATA packet to the Doghouse, the master would immediately return to the polling state in the hope that
Spike's condition would stabilize. The Doghouse will return to  
DOGHOUSE/SPIKE DRIVER Page 1-7 the polling state instead of retransmitting the last packet to avoid having Spike think that an unexpected packet was accepted.



  In the above example, a retransmission of an ACK following the invalid DATA packet might lead Spike to think that the unexpected
DATA packet was accepted.



  Any errors in the packet header fields, PID or control, will result in the loss of the packet. As with unexpected packet types, invalid header fields will cause the transport task to return to its polling state without any retransmission of the previous Doghouse packet.



  1.2.4.1 Data Packet Integrity
Data packet integrity is accomplished by using two different data packet types: DATA(O) and   DATA(1).    Successive DATA packets sent to Spike alternate between the use of   DATA(0)    and   DATA(1)    control fields. This alternation effectively provides a modulo two sequence number attached to downlink data that allows detection of retransmitted DATA packets across polling sequences.



  Spike should always transmit   DATA(1)    packets to the Doghouse, but both types will be acceptable.  



  DOGHOUSE/SPIKE DRIVER Page 1-8   1.2.4.2    Recovery Schemes for Lost Packets
Master Slave Master Slave
EMI203.1     


<tb> POLL <SEP> ---X <SEP> POLL <SEP> ----- >  <SEP> 
<tb>  <SEP>    X <SEP> DATA    <SEP> 
<tb> T/O
<tb> POLL <SEP>    ----- >     <SEP> T/O
<tb>  <SEP>  < ----- <SEP> DATA <SEP> POLL <SEP> ----- > 
<tb> ACK <SEP> ----- >  <SEP>  < ----- <SEP> DATA
<tb>  <SEP>  < ----- <SEP> ACK <SEP> ACK <SEP> ----- > 
<tb> DATA <SEP> ----- >  <SEP>  < ----- <SEP> ACK
<tb>  <SEP>  < ----- <SEP> ACK <SEP> DATA <SEP> ----- > 
<tb>  <SEP> ACK
<tb> 
Master Slave Master Slave
EMI203.2     


<tb> POLL <SEP> ----- >  <SEP> POLL <SEP> ----- > 
<tb>  <SEP>  < ----- <SEP> DATA <SEP>  < ----- <SEP> DATA
<tb> ACK <SEP> -----X <SEP> ACK <SEP> ----- > 
<tb>  <SEP> X--- <SEP> ACK
<tb> T/O
<tb> ACK.

  <SEP>    ----- >  <SEP>     <SEP> T/O
<tb>  <SEP>  < ----- <SEP> ACK <SEP> ACK <SEP> ----- > 
<tb> DATA <SEP> ----- >  <SEP>  < ----- <SEP> ACK
<tb>  <SEP>  < ----- <SEP> ACK <SEP> DATA <SEP> ----- > 
<tb>  <SEP> ACK
<tb> 
Master Slave Master Slave
EMI203.3     


<tb>  <SEP> POLL <SEP> ----- >  <SEP> POLL <SEP> ----- > 
<tb>  <SEP>  < ----- <SEP> DATA <SEP>  < ----- <SEP> DATA
<tb>  <SEP> ACK <SEP> ----- >  <SEP> ACK----- > 
<tb>  <SEP>  < ----- <SEP> ACK <SEP>  < ----- <SEP> ACK
<tb> DATA(1) <SEP> ---x <SEP> DATA(0) <SEP> ----- > 
<tb>  <SEP> X--- <SEP> ACK
<tb>  <SEP> T/O
<tb>  <SEP> POLL <SEP> ----- >  <SEP> T/O
<tb>  <SEP>  < ----- <SEP> ACK <SEP> POLL <SEP> ----- > 
<tb> DATA(1) <SEP> ----- >  <SEP>  < ----- <SEP> ACK
<tb>  <SEP>  < ----- <SEP> ACK <SEP> DATA(0) <SEP> ----- > 
<tb>  <SEP> ACK
<tb>   
DOGHOUSE/SPIKE DRIVER Page 1-9 1.2.4.3  <RTI  

    ID=204.1> BUSY    Conditions   
If three POLL-BUSY packet sequences are received in succession, an error counter will be incremented and an event flag will be    set to notify the session tasks of a possible Spike malfunction.



  1.2.4.4 Polling Timeouts
If Spike is not responding to ACKed POLL packets from the
Doghouse, three potential situations could exist.



   1. There is not a Spike attached to the Doghouse.



   2. For some reason Spike has gone insane and can not respond
 to a POLL.



   3. There is a Spike attached to the Doghouse but the RS-485 is
 hooked up backwards and all the data is being inverted.



  In order to handle the timeout cases listed above, a variable will be maintained to indicated whether or not the Doghouse thinks a Spike is there. If we do not think there is a Spike on   the line, the Doghouse will continue to send ACKed POLLs in an attempt to establish contact with the electric canine. Each    successive POLL will be preceded by a command to the link layer to invert the data stream in an attempt to contact a newly attached device.

 

  If the Doghouse does think there is a Spike attached and there is a timeout to an ACKed POLL, the Doghouse will continue to send   POLLs    requiring an acknowledgement. If the Doghouse receives   three successive timeouts to POLLs, we will assume that the Spike was disconnected. In so doing, we will change the state of the
IS SPIKE THERE flag to NO, set an event flag, reset the Spikelink device driver and begin inverting the data stream before each   
POLL.



     1.2.4.5    Packet Timeouts
The Doghouse will only maintain packet timeouts for data exchanges (no character timeouts). The value of the packet timeouts will be calculated by allowing 1.5 times the expected transport time for each byte, in addition to a turn around constant.



  Since the data exchange rate is roughly 521 us per byte,  
DOGHOUSE/SPIXE DRIVER Page 1-10 transport will allow approximately 780 us per byte. In the case of unknown length receive packets (i.e. DATA packets), 15 ms will be allocated. In addition to the time required for each byte, 6 ms will be included to allow Spike to turn the line around before sending data to the Doghouse.



  The timeout counter will start when interrupts have been enabled to start transmission from the Doghouse to Spike.



  Examples of timeout values are'listed below.



   Action Timeout Timeout Breakdown
 POLLNA 24 ms 3 ms to send POLLNA
 6 ms to turn link around
 15 ms for Spike to send DATA packet
 POLL 24 ms 3 ms to send POLL
 6 ms to turn link around
 15 ms for Spike to send DATA packet
 ACK 12 ms 3 ms to send ACK
 6 ms to turn link around
 3 ms for Spike to send ACK packet
 DATA variable 6 ms to turn link around
 3 ms for Spike to send ACK packet
   ( ( ( (Number    of bytes) / 2 ) * 3 ) + 1 ) / 2 1.2.5 Message Packing    &    Buffering
Many of the messages session wishes to pass to Spike will not   fill the message data area of a packet. In order to make full use of Spike's ability to separate multiple messages in each packet,    transport will attempt to pack as many messages as possible into   each packet before transmission.

  This packing scheme will rely upon the fact that the message data area is capable of holding 43    bytes.



     
During the wait time for the next polling cycle, the session layer may attempt to send more messages than will fit in one    packet or multiple messages that may not packed in the same   buffer (i.e. multiple display commands, multiple EEPROM read commands, and multiple EEPROM write commands). For this reason    several packet buffers will be maintained in an attempt to avoid   the loss of any messages. The current plan is to include five outgoing packet buffers. The buffer maintenance routines will    keep track of the maximum number of buffers used at any one time  
DOGHOUSE/SPIKE DRIVER Page 1-11 and a flag to indicate any overflow conditions. If the allocation flags indicate that we run out of buffers or neared an overflow condition, more buffers will be added.



  1.2.6 Error Counters 1.2.6.1 Errors in Spike Messages
 1. Spike sent a packet with a control field we could not
 recognize
 2. Transport thought it would have to read past the end of the
 data buffer in order to unpack multiple messages from Spike
 3. Spike sent a data packet that either had a length of zero
 or a length larger than the size of the data buffer
 4. Spike sent a packet with an invalid APID
 5. Spike sent a packet with an invalid PID
 6. Spike sent a data message with a message count value of
 zero 1.2.6.2 Spike Response Errors
 1. Transport tried unsuccessfully to send a data packet three
 times and had to give up
 2. Spike did not return an ACK packet following a data packet
 from the Doghouse
 3. A packet timeout occurred when trying to send a DATA packet
 to Spike
 4. Transport tried unsuccessfully to send an ACK to Spike
 three times in a row
 5.

  Transport expected Spike to send an ACK packet but Spike
 sent some other packet type
 6. Transport received BUSY packets to three successive ACKed
 POLLs.  



  DOGHOUSE/SPIKE DRIVER Page 1-12
 7. Transport timed out three times in a row when sending ACKed
 POLLs 1.2.6.3 Errors Detected by Spikelink Driver   
 1. The Spikelink device driver returned an invalid status type
 after an attempt to send a DATA packet to Spike   
 2. The Spikelink device driver status indicated that another
   IO    request was pending when we issued a send DATA request.



   3. The Spikelink device driver status indicated that another
   IO    request was active when we issued a send DATA request.



   4. The Spikelink device driver found an error in the RIO
 request parameters of a send DATA request
 5. The Spikelink device driver found an erroneous reserve
 request in response to a send DATA request
 6. The previous send DATA request to the Spikelink device
 driver was cancelled by a reset command
 7. The Spikelink device driver detected a checksum error in a
 receive packet following a send DATA request 1.2.6.4 DATA Packet Errors from Spikelink Driver
 1. The Spikelink device driver returned an invalid status type
 2. The Spikelink device driver status indicated that another
   IO    request was pending when we issued the POLL request.



   3. The Spikelink device driver status indicated that another
   IO    request was active when we issued the POLL request.



   4. The Spikelink device driver found an error in the RIO
 request parameters   
 5. The Spikelink device driver found an erroneous reserve
 request   
 6. The previous send request to the Spikelink device driver
 was cancelled by a reset command  
DOGHOUSE/SPIKE DRIVER Page 1-13
 7. The Spikelink device driver detected a checksum error in a
 receive packet 1.2.6.5 Resource Errors
 1. Transport could not buffer any more data messages from
 Spike because all of the receive buffers contained data.



   2. Transport tried to get memory from the shared memory pool
 in order to buffer a message but no more memory was avail
 able in the pool.



   3. Transport could not finish all necessary processing before
 the 50 ms scheduling timer indicated that it was time to
 POLL again.



  1.2.7 Error Flags
 1. Transport received BUSY packets to three successive ACKed    POLLS.   

 

   2. Spike sent a packet with an invalid APID
 3. Transport could not buffer any more data messages from
 Spike because all of the receive buffers contained data.



   4. Transport could not finish all necessary processing before
 the 50 ms scheduling timer indicated that it was time to
 POLL again.



   5. Transport tried to get memory from the shared memory pool
 in order to buffer a message but no more memory was avail
 able in the pool.



   6. Transport tried unsuccessfully to send a data packet three
 times and had to give up
 7. Transport timed out three times in a row when sending ACKed
 POLLs
 8. Transport detected an invalid message type when trying to
 unpack a DATA packet from Spike
 9. A general flag that will be set if Transport detects: a bad
 PID, a bad control packet field, an unexpected packet type,  
DOGHOUSE/SPIKE DRIVER Page 1-14
 or an invalid message length.  



  DOGHOUSE/SPIKE DRIVER Page 1-15 1.3 Transport to Session Protocol 1.3.1 Delivering Messages to Spike
Session will make a subroutine call to provide transport with the message to send, the length of the message and the port to send the message to ( 0 for the Doghouse, 0 through 7 for the Kennel).



  1.3.2 Receiving Messages from spike
Each time the Doghouse receives message data from Spike, an event flag will be set indicating that there is data pending for session tasks. When a session task is ready to process Spike message data, it will set another event flag. At the point when both of these two flags are set, a message delivery task will come to life and take care of placing the next message from the transport receive buffer in the mailbox of the waiting session task.



  A bit more intelligence will be placed in the task that puts messages in mailboxes than may otherwise be expected. Since roughly 90% of the messages that Spike will send are button events, the "postman" task will check to see if the message is a button event. If so, the button and event will be placed in the mailbox of the session task. For all other messages, the   "postman" will allocate a buffer from the shared memory pool, copy the message information to the buffer and then place a    pointer to the data in the session task's mailbox. It will be the responsibility of the session task to free the allocated buffer memory when it is finished with the Spike data.



  1.3.3 Message Unpacking  & Buffering
Since Spike may send more than one message in each data packet, transport will have to unpack the messages and individually buffer them until a session task is ready to receive information.



  In order to unpack the messages, transport must recognize message types and the number of bytes associated with each type. The table below contains the current uplink messages and the number of bytes associated with each. If the unpacking routine does not recognize a message type or detects an invalid APID, an error flag will be set and the rest of the message will be lost. If either of these events occur, session should respond as though it received a Key¯Event¯Overflow message and poll the hookswitch of the Spike in question.  



     DOGHOUSE/SPIXE    DRIVER Page 1-16
 Message Number
   Type    (HEX) Operation of   Bvtes   
 81 Reset Event 3
 82 EEPROM Data 18
 83 EEPROM Write Complete 2
 84   KeyEvent    2
 85   Key Event Overflow      0   
 86 Key¯Event Status 2
 87 Reject 2
The receive portion of the transport layer will also buffer messages in an attempt to avoid any message loss. Initially, fifteen message buffers will be allocated to store individual
Spike messages. The receive portion of the transport task will use fifteen buffers since Spike could potentially put three messages in each packet (three times the five buffers guesstimated for the send portion equals fifteen).

  The buffer maintenance routines will keep track of the maximum number of buffers used at any one time and a flag to indicate any overflow conditions. If the allocation flags indicate that we run out of buffers or neared an overflow condition, more buffers will be added.  



     DOGHOUSE/SPIKE    DRIVER Page 1-17   1.3.3.1    Message Data Area Format
The format of the message area follows:
EMI212.1     


<tb>  <SEP> 7 <SEP> 6 <SEP> 5 <SEP> 4 <SEP> 3 <SEP> 2 <SEP> 1 <SEP> 0
<tb>  <SEP> Message
<tb>  <SEP> Header <SEP> APID <SEP> Message <SEP> Count
<tb>  <SEP> Message <SEP> Type
<tb>  <SEP> I <SEP> I <SEP> I <SEP> I
<tb>  <SEP> Msg <SEP>    l <SEP>     <SEP> +---+---+ <SEP> +---+---+ <SEP> I
<tb>  <SEP>    ill    <SEP>    1 <SEP>     <SEP> . <SEP> Message <SEP> Data <SEP>     <SEP> .

  <SEP> I    <SEP> 
<tb>  <SEP> (if <SEP> any)
<tb>  <SEP> Message <SEP> Type
<tb>  <SEP> Msg <SEP> I <SEP> +---+---+
<tb>  <SEP> &num;2 <SEP> Message <SEP> Data
<tb> (if <SEP>  > 1 <SEP> msg) <SEP> (if <SEP> any)
<tb>  <SEP>    etc.    <SEP> 
<tb> 



  Max.



  44 bytes   Where   
APID (4 bits) - is the protocol ID for the application layer. For first release this value will be Olh.



     
Message Count (4 bits) - is the number of messages contained in this packet. This value should never be zero.   



  Message Type (1 byte) - contains the value of the message type.



  Message Data (0 to 42 bytes) - contains parameters and data specific to the particular message.



     Error    Error Counters
 1. Session send a packet with either a length of zero or a
 length larger than the size of the data area  
DOGHOUSE/SPIKE DRIVER Page 1-18
 2. Session requested that the data be send to an invalid port
 number
 3. Session tried to send a message with an invalid message
 type
 4. Session tried to send a message but all the transmit buff
 ers were full 1.3.5 Error Flags
 1. A general transmit error flag that is set when any of the
 first three cases in the 'Error Counter' conditions occur.



   2. An flag to indicate that all the transmit buffers filled
 and another was needed  
DOGHOUSE/SPIKE DRIVER Page 1-19 1.4 Transport to Session Interface 1.4.1 How to Pass Messages to Transport
As previously mentioned, messages are passed to the Spikelink
Transport routines through a subroutine call. The format of the call follows:
 u¯short TX¯Spike¯Msg ( data¯message,
 message¯length,
 message port,
 reset¯flag
 byte   data¯message[DATA¯AREA¯SIZE);   
 u¯short   message¯length,   
 u¯short message port;
 boolean   reset¯flag;   
The constant DATA¯AREA¯SIZE is defined in ST¯CONST.H and currently has a value of 43. The information in the data¯message array should have the message type in the first byte and any message data in subsequent bytes.

  Constants for each of the message types are also defined in ST¯CONST.H
The message¯length is the number of bytes that the transport routine should copy into a transmit buffer (i.e. the number of data bytes plus the message type byte).

 

  The message¯port must be zero for the Doghouse and may be from zero to seven for the Kennel.



  The   reset¯flag    should only be set to TRUE if the message in the data message array is a RESET message. For all other message types, FALSE should be passed as this parameter.



  The declaration for TX¯Spike¯Msg in included in ST¯CONST.H   1.4.1.1    Returns from Calls to   TX¯8ps Msg   
Four different return values may occur to calls to   TX¯Spike Msg.   



  The constants for the return values are defined in   ST CONST.H.   



   1.   NO¯ERROR    - The message was accepted and will be sent to
 Spike.  



  DOGHOUSE/SPIKE DRIVER Page 1-20
 2. NO SPIKE THERE - Transport does not think there is a Spike
 on the leash; the message will be ignored.



   3.   FND¯ERROR    - Could not buffer the message because all the
 transmit buffers were full; the message will be ignored.



   4. BAD INPUTS - An invalid port number or message length was
 specified in the parameter. list; the message will be ig
 nored.



  1.4.2   Hov    to Read Messages from Transport
When a session task is ready to read a message from Spike, the requesting task must place the mailbox number which they would like to receive the message in, in the global variable active mailbox. Once the mailbox value has been stored, the event flag LINE TASK READY (defined in   STCONST.H)    in the event group
SPKLNK GROUP (defined in VCOMMON.H) must be set.



  As soon as the Spikelink transport task sees that a line task is ready to receive data AND there is data available, a message will be placed in the requesting task's mailbox.



  Two types of messages may appear in the mailbox:
 1. Button Event Messages
 2. Non-Button Event Messages
All the structures and unions for the mailbox messages are defined in VSESSITF.H while most of the constants are defined in
ST CONST.H or VSESSITF.H.



  Mailbox variables should be defined as T USER UNION. This union contains the structures for both Button   -    event messages (T¯USER¯SHORT) and Non-Button event messages (T¯USER¯LONG).



  The format of each message type follows.  



  DOGHOUSE/SPIKE DRIVER Page 1-21   1.4.2.1    Button Event Messages
The six byte contents of button event messages is listed below.



   byte scan¯code;
 byte up down;
 word sparel;
 byte port¯num;
 byte type;
The scan code contains the button number on which the event occurred.



  The up down field indicates whether or not the event was a button depression or button release.



  The sparel field is not used.



  The port num field indicates which port the event came from.



  The type field contains the value of the constant   MSG¯USER SHORT.   



  1.4.2.2 Non-Button Event Messages
The six byte contents of non-button event messages is listed below.



   unsigned char far   *P data;   
 byte   port¯num;   
 byte type;
The   P¯data    field contains a pointer to an area of the shared memory pool that contains the message data.  



  DOGHOUSE/SPIKE DRIVER Page 1-22
The format of the data in the memory pool is listed below.
EMI217.1     


<tb>



   <SEP> 7 <SEP> 6 <SEP> 5 <SEP> 4 <SEP> 3 <SEP> 2 <SEP> 1 <SEP> 0
<tb> Number <SEP> of <SEP> bytes <SEP> allocated
<tb> Message <SEP> Type
<tb>  <SEP> Message <SEP> Data
<tb>  <SEP> (if <SEP> any)
<tb>    !!!!! IMPORTANT    !!!!!   
It is the responsibility of the session task using the data to free the memory once the information from the message has been processed. Failure to release memory back to the memory pool will    result in NO-MEMORY errors for future messages.



  The port¯num field indicates which port the event came from.



  The type field contains the value of the constant MSG USER LONG.  



   Table of Contents
 TABLE OF CONTENTS 1.0 Doghouse/Spike Driver Transport Layer (v1.01) .......... 1-1
 1.1 Introduction ........................................ 1-1
 1.1.1 Overview ....................................... 1-1
 1.1.2 References ..................................... 1-1
 1.2 Link to Transport Protocol .......................... 1-2
 1.2.1 Packet Passing Mechanism ....................... 1-3
 1.2.2 Typical Data Transfer Sequences ................ 1-4
 1.2.3 Packet Format .................................. 1-5
 1.2.4 Reliability .................................... 1-6
 1.2.4.1 Data Packet Integrity ..................... 1-7
 1.2.4.2 Recovery Schemes for Lost Packets ......... 1-8
 1.2.4.3 BUSY Conditions ........................... 1-9
 1.2.4.4 Polling Timeouts .......................... 1-9
 1.2.4.5 Racket Timeouts ...........................

   1-9
 1.2.5 Message Packing  & Buffering .................... 1-10
 1.2.6 Error Counters ................................. 1-11
 1.2.6.1 Errors in Spike Messages .................. 1-11
 1.2.6.2 Spike Response Errors ..................... 1-11
 1.2.6.3 Errors Detected by Spikelink Driver ....... 1-12
 1.2.6.4 DATA Packet Errors from Spikelink Driver .. 1-12
 1.2.6.5 Resource Errors ........................... 1-13
 1.2.7 Error Flags .................................... 1-13
 1.3 Transport to Session Protocol .......................... 1-15
 1.3.1 Delivering Messages to Spike ...................... 1-15
 1.3.2 Receiving Messages from Spike ..................... 1-15
 1.3.3 message Unpacking  & Buffering ..................... 1-15
 1.3.3.1 Message Data Area Format ..................... 1-17
 1.3.4 Error Counters ....................................

   1-17
 1.3.5 Error Flags ....................................... 1-18
 1.4 Transport to Session Interface ...................... 1-19
 1.4.1 How to Pass Messages to Transport .............. 1-19
 1.4.1.1 Returns from Calls to TX¯Spike¯Msg ........ 1-19
 1.4.2 How to Read messages from Transport ............ 1-20
 1.4.2.1 Button Event Messages ..................... 1-21
 1.4.2.2 Non-Button Event Messages ................. 1-21  
Appendix 3
EMI219.1     
 1.0 Scope 1.1 Introduction
This document describes the functions performed by, and the
SpikeLink interface to the Spike Firmware. The Spike Firmware operates on an 8051 family processor which resides in a Low-end
Spike, a High-end Spike, or a Marmaduke and communicates with the
Doghouse software by sending messages through SpikeLink, an RS485 serial link.



  2.0 Functional Overview 2.1 Introduction
The Spike and Marmaduke firmware is responsible for managing the keyboard, LEDs, LC Display, EEPROM, and voice path, while reporting events to and taking commands from the Doghouse software through supervision of a communications protocol built on Spike's serial data interface. Besides managing these features, the firmware provides fault detection and reset facilities.  



  SPIKE  & MARMADUKE EDS Page 2-1 2.2 Features 2.2.1 Serial Data Interface
The serial data interface is the physical medium through which communications between Spike and the Doghouse take place.



  Firmware manages this resource by servicing a two layer data communications protocol which provides reliable transport of messages to and from Spike. This protocol is described in detail in Chapter 3. Messages are exchanged over this link at roughly 50 ms. intervals although the rate is variable and is determined by the Doghouse. During any of these exchanges, multiple messages, which may be status or command information, can be transferred in both uplink and downlink directions.



  2.2.2 Keyboard
The firmware periodically scans the keys, which include digit keys, feature keys, and the hookswitch, and reports any changes in state to the Doghouse through the serial link by Key¯Event messages. Key depressions and releases are qualified (debounced) to the degree of one scanning interval, or 25 ms. Key events are buffered and sent to the Doghouse in the next SpikeLink polling interval. As many as 3 key events can be buffered between polls.



  If more than 3 key events occur between polls, the key event buffer will be flushed and firmware will notify the Doghouse by sending a Key¯Event¯Overflow message. Since one of the key events lost in such a situation could have been the hookswitch, Doghouse software should respond to an overflow by requesting the status of the hookswitch. To do this, the Doghouse would send a
Key¯Status¯Request message and Spike firmware would respond with the status of the requested key in a Key Status message. Using the Key¯Status¯Request, the Doghouse can always inquire as to the status of any key.

 

  Firmware is ignorant of the function of the keys with the exception of the digit keys, 1 through &num;. Firmware may be instructed to inject a local 500 Hz tone into the audio path for the duration that any of these digit keys is depressed. Firmware is instructed to enter this mode by assertion of the Keypad Tone
Generation Enable bit (bit 6) in the Audio Flags parameter of the   Set¯Audio Path    message. Clearing this bit in a subsequent   Set¯Audio¯Path    message will disable this mode. The Keypad Tone
Generation feature has been included as an optional method of generating user feedback during the dialing phase of a call. DTMF tones may otherwise be provided for this purpose by the Doghouse.  



  SPIKE  & MARMADUKE EDS Page 2-2 2.2.3 LEDs
Firmware performs two major functions for the display of the
LEDs, cadencing the lamps as instructed by Doghouse software and multiplexing the lamps for power conservation. The Doghouse controls the cadencing of the lamps by sending Display Lamp messages through SpikeLink. These messages include a lamp number and a specific cadence to be used. There are 6 cadences fixed in
ROM including solid on and solid off "cadences". All lamps that are set for the same cadence will blink or flash in phase.



  Multiplexing of the LEDs is used to lower the operating current requirements for Spike. At most, one LED should be turned on at any given time. To meet this requirement, and to insure constant brightness and no visible flicker, outputs to all 9 LEDs are multiplexed on a 55.6 Hz cycle, or 2 ms. per lamp.



  2.2.4 LC Display
Firmware provides three LC Display services for use by Doghouse software. These services are: display of up to 18 byte character strings starting at any cursor position, clearing of NN byte long fields at any cursor position, and a one-shot clear of the entire display. The SpikeLink messages that initiate these features are
Display Text,   Clear¯Display Field,    and Clear Display. The
Display Text and Clear Display Field messages address the cursor by line and column. Messages that address a field that extends past the end of a line will be truncated.



  2.2.5 Audio Path
The audio path to the user is controlled by firmware under the direction of Doghouse software. All hardware audio control features can be controlled through use of the Set Audio Path message. Audio control features include control of the speaker, earpiece, microphone, and mouthpiece. Selection of the appropriate gain control for the audio path may also be made. Gain control is used for selecting use of the ringer or speakerphone potentiometers. Included in the audio control setting is the ability to generate a 500 Hz. local tone injected into the audio path. This tone may also be generated automatically upon depression of a digit key as described earlier in section 2.2.2.



  Note that in most cases, direct control of the audio path is given to the controlling Doghouse software. This has been done to allow the greatest possible flexibility for the operation of current and future features that use the audio path.  



  SPIKE  & MARMADUKE EDS Page 2-3 2.2.6   EBPROM   
The firmware manages the onboard EEPROM as a raw storage resource for Doghouse software. Firmware knows nothing about the contents or position of data stored there. Firmware can write to or read from EEPROM in 16 byte blocks under the command of Write EEPROM and Read¯EEPROM messages. These messages address the EEPROM by block number. There are 512 blocks (8k bytes) of which all but the last 16 blocks (blocks   O1FOh    through OlFFh) can be written to. These last blocks are write-protected in hardware and are used to store read-only manufacturing data such as phone type and serial number. All 512 blocks may be read.



  Note that the 16 write protected blocks are protected in hardware. If firmware is instructed to write to one of these blocks it will attempt to do so and a   EEPROM Write¯Complete    will be sent to the Doghouse following the attempt. Normally, this block was not written to EEPROM, however, special manufacturing drivers may write to protected EEPROM while write protect hardware is disabled by grounding a certain pin on the circuit board (see Sec. 3.2, Spike  & Marmaduke Hardware EDS).



  After a write cycle is complete, firmware will send a
EEPROM Write Complete message to the Doghouse. The Doghouse software should not send another Write EEPROM or Read¯EEPROM request until the EEPROM¯Write¯Complete message is received.



  Although an EEPROM write cycle should complete in one polling interval, this handshake process insures that the command was received, acted on, and that the hardware is ready to read or write additional data.



  In response to a   Read¯EEPROM    message, the firmware will read the requested 16 bytes from EEPROM and send the data to the Doghouse in a EEPROM¯Data message. The Doghouse software should wait for the EEPROM Data message before sending another Read¯EEPROM or
Write¯EEPROM message.  



  SPIKE  & MARMADUKE EDS Page 2-4 2.3 Resets
Resets may occur in normal operation due to power failure or a command from the Doghouse. They may also occur due to abnormal conditions such as watchdog-timer expiration, drift in the firmware stack, spurious serial port interrupts, or wild jumps to unused code space. For all types of resets, the firmware responds similarly.



  2.3.1 Reset Operations
The firmware functions performed during reset processing are:
Determine the cause of the reset.



  This information is passed to the Doghouse upon completion of reset in the Reset Event message.



  Quickly reset all user interfaces.



  This includes turning off the audio path, and clearing the LEDs and LC Display.



  Perform selftest.



  A selftest is performed to determine the health of various processor and spike hardware components. The following tests are performed:
 RAM A four pattern test is made on all of internal
 RAM excluding the register and stack area.

 

   ROM All 4K of ROM is summed and compared with a
 stored ROM checksum.



   Timer Both internal timers are tested for accuracy
 using instruction timing loops.



   Serial Link Loopback tests are performed on the serial link.



   LC Display The LC Display is tested by sending it a command
 and making sure it's BUSY bit is cleared in a
 reasonable amount of time.



  If any of these tests fail, excluding the LC Display test, the test will be performed repeatedly until: the test is passed, or the Watchdog Timer expires. The reasoning for this is that if these tests of the processor continually fail, it is likely that the cause of the failure is not a transient event (ESD, etc.) but that of a hard failure which could result in indeterminate behavior. If the LC Display test fails, the result will be logged in the Reset Event message and operation will continue without the use of the LC Display.  



  SPIKE  & MARMADUKE EDS Page 2-5
Light all LEDs and display LCD logo for 500 ms.



  This step is done ONLY if the cause of the reset is a power failure or WDT timeout. This step is performed to give the user feedback when installing a Spike in addition to providing a mechanism to visually detect a lamp failure. In addition an asterisk (*) will be displayed in the left-most position of each line of the LC Display (if any).



  Initialize internal data structures.



  If the self-tests pass, operating firmware data structures will be initialized. These data structures include those used to manage SpikeLink. During this initialization, the Reset¯Event message will be queued for output to SpikeLink.



  Begin   normal    operation.



  Enable interrupts, start scanning the keyboard, looking for a
SpikeLink POLL, etc.



     2.3.2    Runtime Integrity
The purpose of runtime integrity checks is to catch transient conditions which cause abnormal firmware behavior and to neutralize the effect of such conditions.



  The primary runtime failsafe is the hardware Watchdog Timer (WDT). If firmware fails to reset the Watchdog Timer within 1 second, it will expire and pull the RESET line to the 80C51. This is primarily effective in detecting infinite loops in firmware, perhaps caused by a wild jump into data tables, etc. Note that since a WDT expiration causes a hard reset to the processor, it cannot be distinguished from a power fail reset.



  Other than the WDT, firmware performs the following runtime checks:
 Stack Alignment Periodically, firmware checks that the stack
 size is correct.



   Wild Jump All unused portions of ROM will be filled
 with a jump instruction to a wild jump reset
 entry. If the processor starts running in
 the unused code space, a reset will occur.



   Logic Error Boundary checks will be made on the contents
 of internal data structures so that firmware
 can detect internal inconsistencies that
 require a firmware reset.



   Spurious Interrupt Serial port interrupts that occur while the
 serial line is not enabled for an operation
 that would generate such an interrupt will  
SPIKE  & MARMADUKE EDS Page 2-6
 cause the interrupt to be ignored and a
 Reject message to be generated. For example,
 getting a serial receive interrupt while the
 serial line is operating in the transmit
 direction would cause the firmware to ignore
 the interrupt and queue a Reject message for
 transmission to the Doghouse.



  Since Stack Alignment, Wild Jump, and Logic Error resets are generated by firmware, the cause of the reset can and will be reported in the Reset¯Event message following the reset. Watchdog
Timer resets cannot be distinguished from Power-Fail resets.  



  SPIKE  & MARMADUKE EDS Page 3-1 3.0 spike to Doghouse Link
All communications between Spike and the Doghouse use a two-wire, half-duplex, RS-485 data link operating at 19.2 K baud. Each byte is transferred as 1 start bit, 8 data bits (LSB first), and 1 stop bit. Parity is not used. Control and status information is passed through this link by means of a two-layer communications protocol. The lower layer combines the functions of the link and transport layers of the ISO model. It provides reliable transport of higher layer messages and keeps the half-duplex link synchronized. The higher layer consists of the application messages which pass status of user initiated events as well as control of Spike's user (display,   etc.)    and service (EEPROM, etc.) features.



  Much of the design of the Spike to Doghouse Link (SpikeLink) protocols is predicated on the limited resources of Spike's microcontroller and the physical, two-wire link. Spike is extremely limited on RAM, so SpikeLink is designed to allow the slave to operate with a minimum of buffer memory. Please be tolerant of SpikeLink's primitive qualities.



  Packets may be sent downlink, or Doghouse to Spike, and uplink, or Spike to Doghouse.



  3.1 The   Lfnk/Transport    Layer
The transfer of information between Spike and the Doghouse is based on the exchange of serial packets using a master-slave relationship. The Doghouse is always the master and Spike is always the slave.



  The master initiates information exchange every 50 ms by polling the slave. As previously mentioned, the Doghouse may poll Spike with one of two different messages. One poll requires Spike to return an acknowledgement, a data packet, or a busy message. This type of POLL will be referred to as an ACKed POLL. The second type of poll, an ACKless POLL, does not require any response from
Spike but a data packet will be accepted if sent.



  After an ACKed POLL, the master will expect three possible actions from the slave.



   1. Spike will return an acknowledgement (ACK) indicating that
 he does not have any data to pass to the Doghouse.



   2. Spike will return a data packet to the Doghouse. The master
 will acknowledge the data packet and Spike will acknowledge
 the acknowledgement.  



  SPIKE  & MARMADUKE EDS Page 3-2
 3. The slave will indicate that he is busy and can not accept
 data from the Doghouse. In this case, the master should
 wait until the next polling cycle before attempting any
 further contact with Spike.



  After each of the first two events listed above, the master may send a data packet to Spike which will be followed by an acknowledgement from the slave. If the Doghouse does not have any data to send Spike, he simply waits for the next polling cycle. It is important to note that the master must always send an ACKed POLL to the slave before sending a data packet to Spike.



  After an ACKless POLL, the master will expect two possible actions from the slave.



   1. Spike will return a data packet to the Doghouse. The master
 will acknowledge the data packet and Spike will acknowledge
 the acknowledgement.



   2. The master will timeout waiting for a packet from Spike.



   Since the Doghouse is not really expecting anything from
 Spike anyway, this condition will not be considered an
 error.



  Note that although successive polling sequences may occur, successive downlink data transfers are NOT allowed. The master must always poll the slave for data between sending downlink data packets. It is recommended that downlink data packets be sent
IMMEDIATELY after the polling sequence is complete. This will allow the most efficient use of a slave's single buffer.

 

  As previously mentioned, if the slave is not able to accept further data from the master, it will respond to POLL packets with BUSY packets until the busy condition is cleared.



  There are two forms of DATA packets:   DATA(O)    and   DATA(1).    The extra information carried is a modulo 2 sequence number. Successive downlink DATA packets alternate between use of   DATA(0)    and   DATA(1)    control fields. Retransmitted packets will break this sequence by using the same sequence number.

  This lets Spike know whether or not the DATA packet received is a retransmission.  
SPIKE  & MARMADUKE EDS Page 3-3 3.1.1 Typical Data Transfer Sequences
Master Slave
EMI228.1     


<tb> POLL <SEP> ------- >  <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> DATA
<tb> ACK <SEP> ------- > 
<tb>  <SEP>  < ------- <SEP> ACK
<tb> DATA <SEP> ------- >  <SEP> (Master <SEP> sends <SEP> data <SEP> to <SEP> Slave)
<tb>  <SEP>  < ------- <SEP> ACK
<tb> 
Master Slave
EMI228.2     


<tb> POLL <SEP> ------- >  <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> ACK <SEP> (Slave <SEP> has <SEP> no <SEP> data <SEP> to <SEP> send)
<tb> DATA <SEP> ------- >  <SEP> (Master <SEP> sends <SEP> data <SEP> to <SEP> Slave)
<tb>  <SEP>  < ------- <SEP> ACK
<tb> 
Master Slave
EMI228.3     


<tb> POLLNA <SEP>    ------- 

   >     <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> DATA
<tb>  <SEP> ACK <SEP> ------- > 
<tb>  <SEP>  < ------- <SEP> ACK
<tb>  <SEP> (Master <SEP> has <SEP> no <SEP> data <SEP> to <SEP> send)
<tb> POLLNA <SEP> ------- >  <SEP> (Master <SEP> polls <SEP> Slave <SEP> at <SEP> next <SEP> interval)
<tb> POLLNA <SEP>    ------- >     <SEP> (Master <SEP> polls <SEP> Slave <SEP> at <SEP> next <SEP> interval)
<tb> 
Master Slave
EMI228.4     


<tb> POLL <SEP> ------- >  <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  <SEP>  < ------- <SEP> BUSY <SEP> (Slave <SEP> indicates <SEP> that <SEP> it's <SEP> busy)
<tb>  <SEP> (Master <SEP> waits <SEP> for <SEP> next <SEP> poll <SEP> interval)
<tb> POLL <SEP>    ------- >     <SEP> (Master <SEP> polls <SEP> Slave <SEP> for <SEP> data)
<tb>  

   <SEP>  < ------- <SEP> DATA <SEP> (Slave <SEP> is <SEP> no <SEP> longer <SEP> busy)
<tb> ACK <SEP> ------- > 
<tb>  <SEP>  < ------- <SEP> ACK
<tb> DATA <SEP> ------- >  <SEP> (Master <SEP> sends <SEP> data <SEP> to <SEP> Slave)
<tb>  <SEP>  < ------- <SEP> ACK
<tb>   
SPIKE  & MARMADUKE EDS Page 3-4 3.1.2 Frame Format
The frame type (POLL, ACK, etc.) is included in the frame header.



  The general format of a frame is shown below:
EMI229.1     


<tb>  <SEP> 7 <SEP> 6 <SEP> 5 <SEP> 4 <SEP> 3 <SEP> 2 <SEP> 1 <SEP> 0
<tb> PID <SEP> Control
<tb> Message <SEP> Length
<tb>  <SEP> Message <SEP> Body
<tb> (if <SEP> Data <SEP> type)
<tb> Checksum <SEP> LSB
<tb> Checksum <SEP> MSB
<tb> 
Maximum 48 bytes
Where:
PID (4 bits) - is the Protocol ID field. This field is used to identify the protocol used for the exchange of data. The validation of this field is a requirement for data exchange. In the future, when multiple protocols are specified, some protocol negotiation will be required based on the PID. For first release, this field will be Olh.



  Control (4 bits) - is the control field. This field identifies the packet type. Control field values are:
 00 -   DATA(O)   
   Ol    - DATA(1)
 02 - POLLNA (ACKless POLL)
 03 - POLL (ACKed POLL)
 04 - ACK
 05 - BUSY
   06-OFh    - Undefined and not used
POLLNA, POLL, ACK, and BUSY packets are control packets and therefore have no message body and a message length of zero. The use of the two different forms of the DATA message is explained in Sec. 3.1.3.  



  SPIKE  & MARMADUKE EDS Page 3-5
Message Length (1 byte) - is the length (in bytes) of the body of the message. This does not include protocol header or trailer fields such as PID, control, length, or Checksum. Control packets, such as POLL and ACK, have a message length of zero. For first release, the maximum value of this field for a DATA packet is 44.



     
Message Body (O to 44 bytes) - is the data portion of the protocol. This is a variable length field which contains informa-    tion used by higher level communications layers. The specific contents are detailed in a subsequent section of this document.



  This field is non-existent for control packets (POLL, ACK, BUSY).



  Checksum (2 bytes) - is the mathematical summation of all bytes in the packet not including the checksum itself. In case of an overflow, the checksum is truncated to the two byte size of this field.



  3.1.3 Reliable Transport
Reliable transport is ensured through retransmission of suspected corrupt packets. Packets are considered corrupt if: the calculated checksum of a received packet is inconsistent with the checksum field of the packet, or, if a character timeout has occurred before all bytes of the packet (determined by the length field) have been received.



  For first release, the value of the character timeout will be 1 ms. The value of the packet timeout will be 1.5 times the transport time of the longest expected response packet. The packet timeout will be set following transmission of the last byte of the packet sent. Packet timeouts are used by the master only.



  If the slave determines that a received packet is corrupt, it will flush its input buffer and wait for another transmission from the master. If the master receives a corrupt packet, it will flush its input buffer and wait for a packet timeout to occur.



  When the packet timeout occurs, the master will again flush its input buffer and retransmit its last outgoing message unless the master's last transmission was a DATA packet. In that case, the master waits until the next polling cycle to retransmit the downlink DATA packet. During normal downlink DATA transfers, the master alternates between sending   DATA(O)    and DATA(1) DATA packets. This alternation effectively provides a modulo two sequence number attached to downlink data that allows detection of retransmitted DATA packets across polling sequences. So, if the slave receives a DATA(O) in one polling frame and another DATA(O) in the next, it knows that the   DATA(O)    just received is a retransmission and throws it away after sending an ACK.  



  SPIKE  & MARMADUKE EDS Page 3-6
A packet timeout at the master could also mean that a packet was never sent by the slave, possibly because the the last downlink packet was corrupt and was thrown away by the slave. Again, the master retransmits the previous downlink packet. The slave can determine if the packet is a retransmission based on its state or sequence number and if so, the slave will respond to the link as though it has not seen the packet before. For example, if the slave correctly received a POLL from the master, but the returned
DATA was lost, the master would time out and resend the POLL packet. The slave at that time is looking for an ACK packet since it knows it cannot receive a POLL after sending a DATA packet.

 

  So, the slave responds by resending the same DATA packet to the master.



  If the master does not receive a proper response to a downlink packet after a third retransmission, the master will abort the current transmission attempt, log a link reset, and begin polling the slave. If the slave continues to respond improperly, the master may consider the link down, but should continue to poll the slave so as to provide service as soon as the condition is corrected.



  For more information on transport reliability, see the
Doghouse/Spike Driver Transport Specification.  



  SPIKE  & MARMADUKE EDS Page 3-7 3.1.3.1 Recovery Schemes for Lost Packets
Master Slave Master Slave
EMI232.1     


<tb> POLL <SEP> ---X <SEP> POLL <SEP>     <SEP>    
<tb>  <SEP> X--- <SEP> DATA
<tb> T/O
<tb> POLL <SEP>    ----- >     <SEP> T/O
<tb>  <SEP>  < ----- <SEP> DATA <SEP> POLL <SEP> ------- >  <SEP> 
<tb> ACK <SEP> ----- >  <SEP>  < ----- <SEP> DATA
<tb>  <SEP>  < ----- <SEP> ACK <SEP> ACK <SEP> ----- > 
<tb> DATA <SEP>    -¯¯¯¯ >  <SEP>     <SEP>  < ----- <SEP> ACK
<tb>  <SEP>  < ----- <SEP> ACK <SEP> DATA <SEP> ----- > 
<tb>  <SEP>  < ----- <SEP> ACK
<tb> 
Master Slave Master Slave
EMI232.2     


<tb> POLL <SEP>    ----- >     <SEP> POLL <SEP> ----- >  <SEP> 
<tb>  <SEP>  < ----- <SEP> DATA <SEP>  < ----- <SEP> DATA
<tb>  <SEP> ACK <SEP> ---X <SEP> ACK <SEP> ----- >  <SEP> 
<tb>  <SEP> 

      ACK    <SEP> ACK
<tb>  <SEP> T/O
<tb>  <SEP> ACK <SEP> ----- >  <SEP> T/O
<tb>  <SEP>  < ----- <SEP> ACK <SEP> ACK <SEP> ----- > 
<tb> DATA <SEP> ----- >  <SEP>  < ----- <SEP> ACK
<tb>  <SEP>  < ----- <SEP> ACK <SEP> DATA <SEP> ----- > 
<tb>  <SEP>  < ----- <SEP> ACK
<tb> 
Master Slave Master Slave
EMI232.3     


<tb>  <SEP> POLL <SEP>    ----- >     <SEP> POLL <SEP> ----- >  <SEP> 
<tb>  <SEP>  < ----- <SEP> DATA
<tb>  <SEP> ACK <SEP> ----- >  <SEP> ACK <SEP> ----- > 
<tb>  <SEP>  < ----- <SEP> ACK <SEP>  < ----- <SEP> ACK
<tb> DATA(1) <SEP> ---X <SEP> DATA(0)
<tb>  <SEP> X--- <SEP> ACK
<tb>  <SEP> T/O
<tb>  <SEP> POLL <SEP> ----- >  <SEP> T/O
<tb>  <SEP>  < ----- <SEP> ACK <SEP> POLL <SEP> ----- > 
<tb> DATA(1) <SEP>    ----- >     <SEP>  < ----- <SEP> ACK
<tb>  <SEP>  < ----- <SEP> ACK <SEP> DATA(0)
<tb>  <SEP> 

   ACK
<tb>   
SPIKE  & MARMADUKE EDS Page 3-8 3.2 The Application Layer
Messages sent between Spike and Doghouse constitute the highest layer of information transfer in the SpikeLink protocol.



  SpikeLink messages request or report application events such as button events, ringing requests, and LCD display data.



  Messages are divided into downlink, or Doghouse to Spike, and uplink, or Spike to Doghouse.



  The format of the application message area is as follows:
EMI233.1     


<tb>  <SEP> 7 <SEP> 6 <SEP> 5 <SEP> 4 <SEP> 3 <SEP> 2 <SEP> 1 <SEP> 0
<tb>  <SEP> Application
<tb>  <SEP> Header <SEP> APID <SEP> Message <SEP> Count
<tb>  <SEP> / <SEP> i <SEP> Message <SEP> Type <SEP> I <SEP> I
<tb>  <SEP> I <SEP> +---+---+---+---+---+---+---+---+ <SEP> I
<tb>  <SEP> Msg
<tb>  <SEP> &num;1 <SEP> Message <SEP> Data
<tb>  <SEP> I <SEP> . <SEP> (if <SEP> any) <SEP> . <SEP> I
<tb>  <SEP> message <SEP> Type
<tb>  <SEP> Msg
<tb>  <SEP> &num;2 <SEP> message <SEP> Data
<tb> (if <SEP>  > 1 <SEP> msg) <SEP> (if <SEP> any)
<tb>  <SEP> etc. <SEP> . <SEP> I
<tb> 
 Max.



  44 bytes
Where:
APID (4 bits) - is the protocol ID for the application layer. For first   release    this value will be Olh.



     Message    Count (4 bits) - is the number of messages contained in this packet. This value is never zero.



     Message    Type (1 byte) - contains the value of the message type.



  Message Data (O to 42 bytes) - contains parameters and data specific to the particular message. The format of these bytes is discussed in the description of the individual message.  



  SPIKE        MARMADUKE EDS Page 3-9 3.2.1 Downlink Messages 3.2.1.1 Reset
Value: Olh
Data: None
Description: This message initiates a Spike reset sequence
 which includes a full selftest. If no fatal errors
 are found during the selftest, Spike will return a
 Reset¯Event message. Note that Spike will not
 service the link while performing selftest. For
 more on resets see Sec. 2.2.



  3.2.1.2   Read¯EEPROM   
Value: 02h
Data: EEPROM¯Block¯Number (2 bytes:   (lsb,msb))   
Description: Request for Spike to send contents of the 16 byte
 block of EEPROM referenced by EEPROM¯Block¯Number.



   Spike should respond with an EEPROM¯Data message.



   For first release, valid   EEPROM Block Number   
 addresses for this operation are 00 to   lFFh.    If
 the EEPROM¯Block¯Number is out of bounds or if the
 EEPROM is currently executing a read or write
 cycle, Spike will respond with a Reject message.



   Doghouse software should wait for a EEPROM¯Data
 response before sending another Read¯EEPROM or
 Write¯EEPROM request.  



  SPIKE  & MARMADUKE EDS Page 3-10 3.2.1.3 Write EEPROM
Value: 03h
Data:   EEPRON Block Number    (2 bytes:   [lsb,msb))   
 EEPROM Raw Data (16 bytes:   [lsb,lsb+1,. ..,msb-       l,msb)) -   
Description: Request for Spike to write EEPROM Raw Data to the
 16 byte block of EEPROM referenced by
 EEPROM Block Number. If the write operation
 proceeds normally, a EEPROM   WriteCOmplete    message
 will be returned following completion of the
 EEPROM write cycle (approx. 5 ms.). For first
 release, valid EEPROM Block Number addresses for
 this operation are 00 to lFFh. Note that although
 firmware will accept EEPROM Block Numbers that
 fall in the write protected area (1F0h to 1FFh),
 these writs will not normally occur due to write
 protect circuitry.

  Firmware accepts writes to
 these areas so that manufacturing equipment can
 access the protected areas while the write protect
 circuitry is physically disabled (see Sec. 3.2,
 Spike  & Marmaduke Hardware EDS). If the
 EEPROM Block Number is out of bounds or if the
 EEPROM is currently executing a write cycle, Spike
 will respond with a Reject message.



  3.2.1.4   ClearDisplay   
Value: 04h
Data: None
Description: Causes Spike to clear the entire LCD display.  



  SPIKE  & MARMADUKE EDS Page 3-11 3.2.1.5 Clear¯Ddisplay¯Field
Value: 05h
Data: Display Line (1 byte)
 Display Length (1 byte)
 Display¯Column (1 byte)
Description: Spike will clear Display¯Length number of charac
 ters starting at Display Column on Display Line.

 

   Accepted Display¯Line values are 0 to 3 inclusive.



   Accepted Display¯Column values are 0 to 27h in
 clusive. Accepted Display¯Length values are 1 to
 27h inclusive. The display addressing format is as
 follows:
 Display¯Column
EMI236.1     


<tb> Display¯Line <SEP> 00 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>  <SEP> 01 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>  <SEP> 'Duke <SEP> 02 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>  <SEP> only <SEP> 03 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>   
SPIKE    &    MARMADUKE EDS Page 3-12 3.2.1.6 Display Text
Value: 06h
Data: Display Line (1 byte)
 Display Length (1 byte)
 Display Column (1 byte)
 Display Data (1 to 19 bytes)
Description:

  Spike will load Display Data to the LCD display
 starting at Display Column on Display Line.



   Display Length must contain the number of charac
 ters in Display Data. The mapping of data bytes in
 Display Data to the actual characters displayed is
 published in literature describing the HD44780
 Controller/Driver Chip. Accepted Display Line
 values are 0 to 3 inclusive. Accepted
 Display¯column values are 0 to 27h inclusive.



   Accepted Display¯Length values are 1 to 27h in
 clusive. Use of any combination of LCD addressing
 parameters that would cause a write to an LCD
 address outside of the visible display area will
 result in a Reject message. The display addressing
 format is as follows:
 Display¯Column
EMI237.1     


<tb> Display¯Line <SEP> 00 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>  <SEP> 01 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>  <SEP> 'Duke <SEP> 02 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>  <SEP> only <SEP> 03 <SEP> 00 <SEP> 01 <SEP> 02 <SEP> 03 <SEP> 24h <SEP> 25h <SEP> 26h <SEP> 27h
<tb>   
SPIKE  & MARMADUKE EDS Page 3-13 3.2.1.7 Display¯Lamp
Value: 07h
Data: Lamp Number (1 byte)
 Cadence¯Number (1 byte)
Description:

  Initiates display described by Cadence¯Number to
 LED[Lamp¯Number]. Cadence¯Number values correspond
 to cadences as shown below. Lamp¯Number values
 correspond to physical lamp positions as shown
 below. Lamp names are those referenced in Figures
 4-1, 4-2, and 4-3.



   Lamp¯Number: 00 = LED1
 01 = LED2
 02 = LED3
 03   =    LED4
 04 = LED5
 05 = LED6
 06 = LED7
 07 = LED8
 08 = Message Waiting LED
 Cadence¯Number: 00 = Solid Off
 01 = solid on
 02 = Flash (500   me.    On, 500 ms. Off)
 03   =    Wink (375 ms. On, 125 ms. Off)
 04 = Slow Wink (1875 ms. On, 125 ms. Off)
 05 = TBD
 06 = TBD  
SPIKE  & MARMADUKE EDS Page 3-14 3.2.1.8 Key¯Status¯Request
Value: 08h
Data:   KeyNumber    (1 byte)
Description: Request for Spike to report status of key indi
 cated by Key Number. Expected response is a
 Key Status message. Doghouse software should wait
 for a Key Status response before sending another
 Key Status Request. Key¯Number values correspond
 to physical key positions as shown below. Key
 names are those referenced in Figures 4-1, 4-2,
 and 4-3.  



  SPIKE  & MARMADUKE EDS Page 3-15
 Spike Mapping
 Key Number:
 00 = 1 10 = 10 = Cl
 01 = 2 11 = C2
 02 = 3 12 = C3
 03 = 4 13 = C4
 04 = 5 14 = 14 = C5
 05 = 6 15 = C6
 06 = 7 16 = C7
 07 = 8 17 = C8
 08 = 9 18 = un
 09   =    0 19 = 19 = D1
 0A = * 1A = D2
 0B = &num; 1B = D3
 0C = S1 1C = D4
 0D = S2 1D = D5
 0E = S3 1E = D6
 OF =   S4    1F = D7
 20 = Hookswitch
 Note: Low-end Spike keys are a subset of High-end Spike keys.



   Marmaduke Mapping
 Key¯Number:
 00 = 1 10 = 10 = C5
 01 = 2 11 = C6
 02 = 3 12 = L1
 03 = 4 13 = L2
 04 = 5 14 = L3
 05 = 6 15 = L4
 06 = 7 16 = L5
 07 = 8 17 = L6
 08 = 9 18 = D3
 09 = 0 19 = D4
 0A = * 1A = D5
 0B = &num; 1B = D6
 0C = C1 1C = D7
 0D = C2 1D = D8
 0E = C3 1E = D9
 OF = C4 1F = D10   
 20 = D1
 21 = D2     
 SPIKE  & MARMADUKE EDS Page 3-16
 3.2.1.9 Set¯Audio¯Path
 Value: 09h   Data:    Audio¯Flags (1 byte)
I I Format:
I I
Bit 0-4 : Encoded control for speaker, ha mic, and volume control. See ha
EDS for format.



  Bit 5 : 0=Tone generation off
 1=Tone feneration on
I I
Bit 6 : 0=Keypad tone queneration   disab@    1=keypad tone qeneration enable
I l Bit 7 :   0    (not used)
 Description: Selects the audio path for Spike as described by
   Audio¯Flags.    Tone generation controls injection of
 a 500 Hz. tone into the audio path. When keypad
 tone generation is enabled, a tone will be in
 jected into the audio path while one or more of
 the 12 DTMF keys is depressed.



  I The default used for Audio Flags at reset time is   1 O1Fh.     



  SPIKE  & MARMADUKE EDS Page 3-17 3.2.2 Uplink Messages 3.2.2.1   Roset Event   
Value: 81h
Data: Reset Type (1 byte)
 Format:
 00=Hard Reset (Power-fail, WDT)
 01=Soft Reset (Reset initiated by Reset message)
 02=Stack Alignment Error Reset
 03=Wild Jump Error Reset
 04=Logic Error Reset
   SelftestResults    (1 byte)
 Format:
 Bit   0    : O=LC Display lines 1 and 2 responding
 1=LC Display lines 1 and 2 not respond
 Bit 1 : O=LC Display lines 3 and 4 responding
   l=LC    Display lines 3 and 4 not responc
 Bit 2-7 : O (not used)
   Firmware¯Rev Level    (1 byte)
Description: Indicates that a reset has just occurred and that
 firmware is now functional and servicing the link.



     ResetType    indicates the cause of the reset.



   Selftest Results indicates the status of hardware
 subsystems (currently only the LC display) tested
 during the reset. Note that if the processor does
 not pass selftest during reset processing, this
 message will not be generated and firmware will
 not service the link. For more information on
 resets, see Sec. 2.2.



   Firmware Rev¯Level will be equal to 01 until the
 first customer shipment.  



  SPIKE  & MARMADUKE EDS Page 3-18 3.2.2.2 EEPROM Data
Value: 82h
Data:   EEPROM Block Number    (2 bytes:   [lsb,msb))   
 EEPROM Raw Data (16 bytes:   [lsb,lsb+l,...,msb-       l,msb]) -   
Description: Returns the EEPROM¯Data stored in EEPROM at
 EEPROM¯Block¯number requested by the last
 Read¯EEPROM message received. For first release,
 valid EEPROM¯Block¯Number addresses are 00 to
 lFFh.

 

  3.2.2.3 EEPROM¯Write¯Complete
Value: 83h
Data: EEPROM¯Block¯Number (2 bytes:   [lsb,msb))   
Description: Indicates that the EEPROM write cycle initiated by
 last Write EEPROM at EEPROM Block number was
 attempted.  



  SPIKE  & MARMADUKE EDS Page 3-19 3.2.2.4   Key¯Event   
Value: 84h
Data: Key¯Number (1 byte)
   Key¯EventType    (1 byte)
 Format: 00=Key closed
   01=Key    open
Description: Reports that a debounced key event has occurred at
 Key Number. Key Number values correspond to physi
 cal key positions as shown below. Key names are
 those referenced in Figures 4-1, 4-2, and 4-3.  



  SPIKE  &  MARMADUKE EDS Page 3-20
 Spike Mapping
 Key Number:
 00 = 1 10 = 10 = C1
 01 = 2 11 = C2
 02 = 3 12 = C3
 03 = 4 13 = C4
 04 = 5 14 = 14 = C5
 05   =    6 15 =   e6   
 06 = 7 16
 07 = 8 17 = C8
 08 = 9 18 = u
 09 = 0 19 = L9 = D1
 0A = * 1A =
 0B = &num; 1B =
 OC =   S1    1C = D4
 OD =   S2    1D = LD = D5
 OE = S3 1E =
 OF =   S4    1F = D7
 20 = Hookswitch
Note: Low-end Spike keys are a subset of High-end Spike keys.



   Marmaduke Mapping
 Key Number:
 00 = 1 10 = C5
 01 = 2 11 = C6
 02 = 3 12 = L1
 03 - 4 13 = L2
 04 = 5 14 =
 05   =    6 15 = L4
 06 = 7 16 = L6 = L5
 07 - 8 17 = L6
 08 = 9 18 =
 09 = 0 19 = D4
 0A = * 1A = D5
 0B = &num; 1B = 6
 OC = 0C = C1 1C = D7
 OD = C2 1D = D8
 OE = C3 1E = D9
 0F = C4 1F = D10
 20 = D1
 21 = D2  
SPIKE  & MARMADUKE EDS Page 3-21 3.2.2.5 Key¯Event¯Overflow
Value: 85h
Data: None
Description: Indicates that more than 3 Key¯Events were
 qualified during the last key scan. If this oc
 curs, the buffer will be flushed and the 3
 Key¯Events will be lost.



     3.2.2.6 tey¯8tatus   
Value: 86h
Data: Key¯Number (1 byte)
 Key¯Status¯Type (1 byte)
 Format:   00=Key    closed
   01=Key    open
Description: Reports the debounced status of key Key¯Number in
 response to a   Key Status¯Request    message.



     KeyNumber    values correspond to physical key
 positions as shown below. Key names are those
 referenced in Figures 4-1, 4-2, and 4-3.  



  SPIKE  & MARMADUKE EDS Page 3-22
 Spike Mapping
 Key¯Number:
 00 = 1 10 = 10 = C1
 01 = 2 11 = C2
 02 = 3 12 = C3
 03 = 4 13 = C4
 04 = 5 14 = C5
 05   =    6 15 = C6
 06 = 7 16 = C7
 07 = 8 17 = C8
 08   =    9 18 = unused
 09 = 0 19 = D1
 OA = * 1A = D2
 0B = &num; 1B = D3
 0C = S1 1C = D4
 0D = S2 1D = D5
 0E = S3 1E = D6
 OF = 54 1F = D7
 20 = Hookswitch
 Note: Low-end Spike keys are a subset of High-end Spike keys.



   Marmaduke Mapping
 Key¯Number:
 00 = 1 10 = C5
 01 = 2 11 = C6
 02 = 3 12 = L1
 03 = 4 13 =
 04 = 5 14 =
 05 = 6 15 = L4
 06 = 7 16 = L5
 07   =    8 17 = L6
 08 = 9 18 = D3
 09 = 0 19 = D4
 0A = * 1A = D5
 0B = &num; 1B = D6
 0C = C1 1C = D7
 OD = C2 1D = D8
 OE = C3 1E = D9
 0F = C4 1F = D1
 20 = D1
 21 = D2  
SPIKE  & MARMADUKE EDS Page 3-23 3.2.2.7 Reject
Value: 87h
Data: Reject¯Cause (1 byte)
 Format: 00=Resource busy
   01=Message    type out of bounds
 02=Message field(s) out of bounds
 03=APID bad
 04=Count field = 0
   05=Bad    interrupt received
   Rejected¯Message¯Type    (1 byte)
 Message Type value; OFFh if not applicable
Description:

  This message indicates that the previously
 received message of type Rejected¯Message¯Type
 (Write Configuration¯Data, Display Text, etc.) was
 not acted on for the reason described by
 Reject¯Cause.  



   Table of Contents
 TABLE OF CONTENTS 1.0 Scope () ........................................ 1-2
 1.1 Introduction ........................................ 1-2
 1.2 Document History .................................... 1-2
 1.3 Reference Documents ................................. 1-2 2.0 Functional overview () ................................. 2-2
 2.1 Introduction ........................................ 2-2
 2.2 Features ............................................ 2-1
 2.2.1 Serial Data Interface .......................... 2-1
 2.2.2 Keyboard ....................................... 2-1
 2.2.3 LEDs ........................................... 2-2
 2.2.4 LC Display ..................................... 2-2
 2.2.5 Audio Path ..................................... 2-2
 2.2.6 EEPROM ......................................... 2-3
 2.3 Resets ..............................................

   2-4
 2.3.1 Reset Operations ............................... 2-4
 2.3.2 Runtime Integrity .............................. 2-5 3.0 Spike to Doghouse Link () .............................. 3-1
 3.1 The Link/Transport Layer ............................ 3-1
 3.1.1 Typical Data Transfer Sequences ................ 3-3
 3.1.2 Frame Format ................................... 3-4
 3.1.3 Reliable Transport ............................. 3-5
 3.1.3.1 Recovery Schemes for Lost Packets ......... 3-7
 3.2 The Application Layer ............................... 3-8
 3.2.1 Downlink Messages .............................. 3-9
 3.2.1.1 Reset ..................................... 3-9
 3.2.1.2 Read¯EEPROM ...............................

   3-9
 3.2.1.3 Write¯EEPROM 3-10
 3.2.1.4   Clear Display    3-10
 3.2.1.5   Clear Display Field    3-11
 3.2.1.6   Display      3-12   
 3.2.1.7   Display      3-13   
 3.2.1.8 Key Status Request 3-14
 3.2.1.9 Set¯Audio¯Path ............................ 3-16
 3.2.2 Uplink Messages ................................ 3-17
 3.2.2.1 Reset¯Event ............................... 3-17
 3.2.2.2 EEPROM¯Data ............................... 3-18
 3.2.2.3 EEPROM¯Write¯Complete ..................... 3-18
 3.2.2.4 Key¯Event ................................. 3-19
 3.2.2.5 Key Event Overflow 3-21
 3.2.2.6 Key¯Status ................................... 3-21
 3.2.2.7 Reject .......................................

   3-23  
 Appendix 4
Reregistration Rev 1.4 Page 1-1
Release 1.0 Introduction
This document discusses the protocol for the registering, reregistration and deregistration of voice and trunk interface units. To aid the readers understanding, these three terms are defined as follows:
Registration Registration is the process by which a unit ob
 tains a Configuration ID (CID) which has never
 been used on the network. Registration is done by
 entering the CID on the phone's keypad. An I/O
 unit needs a CID in order to obtain a Configura
 tion Image, without which it can not operate. The
 NEMAC task controls the registration process and
 knows if a CID has been registered.



  Reregistration Reregistration is the process by which a CID, that
 has already been registered, can be transferred
 from one unit to another without physically moving
 the unit. In other words, a phone number (and its
 associated configuration data) is moved from one
 physical unit to another. Reregistration is done
 by entering the previously registered CID on the
   "new"    phone's keypad. The   "old"    phone loses its
 CID and becomes inoperative. The NEMAC task con
 trols the reregistration process and knows if a
 CID is being reregistered.

 

   Reregistration is of particular importance to
 MAPIs. The need to move a single phone to or from
 a MAPI will often arise. At the same time the MAPI
 can not be moved since a number of other phones
 must remain attached.



  Deregistration Deregistration is the process by which a unit is
 caused to lose its CID (and configuration). The
 unit becomes inoperative. The deregistration
 procedure is carried out through the NetMan-PC by
 entering the appropriate command and the CID to be
 deregistered.  



  Reregistration Rev 1.4 Page 2-2
Release 2.0 General operating Modes
The network may operate in any of three general modes regarding registration and reregistration:
 No-Registration Registration of units is disallowed.



   Reregistration of units is disallowed.



   No-Reregistration Registration of units is allowed.



   Reregistration of units is disallowed.



   Global Reregistration Registration of units is allowed.



   Reregistration of units is allowed.



  These three general modes of operation apply equally to all units on the network. The situation might arise where a single unit needs to be registered or reregistered while maintaining a No
Registration restriction on all other units. For this purpose
Selective Reregistration has been   provided. [I)    It is available in all three general modes of operation. Selective Reregistration allows the system administrator to give a specific CID permission to register or reregister. The permission can be limited to a specified length of time and once used, is canceled. Selective
Reregistration provides maximum configuration security but is highly restrictive. On the other hand, Global reregistration provides a high level of freedom to register and reregister units but a low level of configuration security.



  The three general operating modes and Selective reregistration are discussed in detail below. The remainder of this document is highly technical. The casual reader may wish to skip the remainder of the document and instead turn to Appendix B, "Modes of Registration Illustrated".



     [1]    The term Selective Reregistration was chosen over Selective
 Registration because it was thought the function will be used
 more often for purposes of reregistration than registration.



   This was also true in the case of the term Global Reregistra
 tion.  



  Reregistration Rev 1.4 Page 3-3
Release 3.0 No-Registration Mode
The No-Registration mode prevents any unit from registering or reregistering (except those with Selective Reregisteration permission). This mode provides the highest level of configuration security. Only units with Selective Reregistration permission are allowed to register or reregister. The No-Registration mode is initiated by issuing the appropriate command at the
NetMan-PC console. Using a SCSI level Control Packet, the NetMan
PC instructs the NEMAC task to reject all CID registration request packets arriving from the network, except those with Selective Reregistration permission. For more on this topic, see
Selective Reregistration.



  4.0 No-Reregistration Mode
The No-Reregistration mode prevents any unit from reregistering except those with Selective Reregisteration permission. This mode provides an intermediate level of configuration security. Units attempting to register with CIDs not currently registered are allowed to do so. Units with Selective Reregistration permission are also allowed to register or reregister. The No-Reregistration mode is initiated by issuing the appropriate command at the
NetMan-PC console. Using a SCSI level Control Packet, the NetMan
PC instructs the NEMAC task to reject all CID reregistration request packets arriving from the network except those with
Selective Reregistration permission. For more on this topic, see
Selective Reregistration.



  5.0 Global Reregistration Mode
Global reregistration is intended to be used in situations where a large number of units must be reregistered (e.g. an office floor plan is being reorganized) or where unit configuration security is of little concern. The global reregistration mode is initiated by issuing the appropriate command at the NetMan-PC console. Using a SCSI level Control Packet, the NetMan-PC instructs the NEMAC task to accept any and all CID registration request packets arriving from the network and to modify the
PID/CID/PUA tables. It should be noted, the packet generated for unit reregistration will be of the same format as those used for
CID registration requests.  



     Reregstration    Rev 1.4 Page 5-4
Release
At the PCP tables level, global reregistration means any physical unit, identified by its PID, may request a new identity by sending a CID registration request packet containing a new CID to
NEMAC. In the No-Registration and No-Reregistration modes, if a
CID registration request packet is received and the PCP tables already contain an entry for the specified CID or the   reouester's      PID,    the request is rejected.



  5.1 System Actions Under Global Reregistration.



  With global reregistration enabled, CID registration requests are not rejected. The state diagram for global reregistration is presented in Figure 1 and is described textually below.



  The NEMAC task first checks the NDD for the specified CIDs configuration file. Further actions depend on the existence of the configuration file.



  5.1.1 Configuration File Is Not Found
If the configuration file is not found, a CID response packet containing the Bogus CID (see Appendix A) is returned to the requester. The receipt of a CID response packet containing the
Bogus CID as the result of a manually entered CID, as in all cases, is treated as negative response. The Bogus configuration file is not requested. The unit maintains whatever configuration it had at the time of the request.



     5.1.2    Configuration   Pile    Is Pound
If the configuration file is found, the PCP tables are then examined for the specified CID. Depending on the results of this search the following actions will be taken.



     5.1.2.    CID Is Found
If the CID is found:
 1. The NEMAC task sends a Kill Packet to the PUA of the unit
 currently associated with the CID, the "Old Unit".



   2. When the Old Unit receives the Kill Packet, it clears its
 LUA and LE(s) thus disabling the unit.



   3. NEMAC then deletes the CID along with the associated PID  
Reregistration Rev 1.4 Page 5-5
Release
 and PUA from the PCP tables, and adds the CID, PID and PUA
 contained in the original (New) CID registration packet.



   4. A CID response packet containing the valid CID is returned
 to the original requester.



  Steps one and two are needed to avoid two units using the same configuration and therefore the same LUA.



     5.1.2.2    CID Is Not Found
If the CID is not found, there is no possibility the CID is in use by any unit on the network.



   1. NEMAC adds the specified CID along with the PID and PUA
 contained in the CID registration packet to PCP tables.



   2. A CID response packet containing the valid CID is returned
 to the requester.



  5.2 Global Reregistration, Summary
In global reregistration mode everything goes. If a valid CID is entered at a given phone, that CID becomes associated with the phone's PID. The CID previously associated with the phone is gone, deleted from the PCP tables.

 

  6.0   Selective      Reregistration   
Selective reregistration is intended to be used in situations where a relatively small number of units must be registered or reregistered (e.g. an   individual    is moving to a new office). It provides a high level of system security while allowing authorized individuals to register or reregister their phones.



  Selective reregistration is initiated by issuing the appropriate command at the NetMan-PC console. Using a SCSI level Control
Packet, the NetMan-PC instructs the NEMAC task on the NMIG to accept CID registration request packets for only the specified
CID.



  At the PCP tables level, selective reregistration means any physical unit, identified by its PID, may only take on the iden  
Reregistration Rev 1.4 Page 6-6
Release tity of a CID   whcse    PCP tables entry is marked for reregistration. The configuration file must be present on the NDD. Once reregistration of a CID has been accepted, permission to reregister that CID is withdrawn by NEMAC.



  6.1 system Actions For Selective Reregistration
The state diagram for selective reregistration is presented in
Figure 2 and is described textually below. The NEMAC task first checks the system's general operating mode. The NEMAC stores the state of the general operating mode in the global variable, byte   Gen Op Mode.    If the Global Reregistration operating mode is in force, Selective Reregistration has little effect. Further actions are identical to those described under Global Reregistration.



  If the Global Reregistration operating mode is not in force, the
NEMAC task checks if the CID appears in the PCP Tables. If the
CID does not appear in the PCP Tables, it can not be previously registered and can not have reregistration permission. The   rereghash)    and   cid¯hash[]    tables are used to find the selected
CID in the   pcp[)    table. Further actions depend on the existence of the CID in the   pcp()    table.



     .1.1    CID Is Not Found In PCP Tables
If the CID is not found in the PCP Tables, the CID can not have been previously registered. The system's general operating mode is checked. The NEMAC stores the state of the general operating mode in the global variable, byte Gen¯Op¯Mode. Further actions depend on whether the No-Registration or No-Reregistration mode is in effect.



     6.1.1.1 No-Registration    Mode In Effect
If the target CID is not found in the PCP tables, the No
Registration mode blocks any further processing of the registration request. A CID response packet containing the Bogus CID will be returned to the requester. The receipt of a CID response packet containing the Bogus CID as the result of a manually entered CID, as in all cases, is treated as negative response.



  The Bogus configuration file is not requested. The unit maintains whatever configuration it had at the time of the request. No changes to the PCP tables are made. Statistics as to the number of attempts made to reregister a given CID could be kept but this  
Reregistration Rev 1.4 Page   6-7   
Release is not currently done.



  6.1.1.2 No-Reregistration Mode In Effect
If the target CID is not found in the PCP tables and the No
Reregistration mode is in effect, it may still be possible to register the target CID. Further actions depend on the existence of the target CID's configuration file on the NDD. See "Checking
For The Configuration File" below.



  6.1.2 CID Is Found In PCP Tables
If the CID is found in the PCP Tables, the NEMAC task checks if the CID has selective reregistration permission. The   rereg hash[]    table is used to find the selected CID in the   pcp[)    table. The   pup flag    field of the   pcp()    entry can then be checked for the validity and the reregistration permission of the entry. Further actions depend on the reregistration permission associated with the CID.



  6.1.2.1 CID Does Not Have Reregistration Permission
In this situation the CID appears in the pcp[l table but has only the   VALID PCP    flag set. If the CID does not have reregistration permission, a CID response packet containing the Bogus CID will be returned to the requester. The receipt of a CID response packet containing the Bogus CID as the result of a manually entered CID, as in all cases, is treated as negative response.



  The Bogus configuration file is not requested. The unit maintains whatever configuration it had at the time of the request. No changes to the PCP tables are made. Statistics as to the number of attempts made to reregister a given CID could be kept but this is not currently done.



  6.1.2.2 CID   las    Reregistration Permission
If the CID has reregistration permission, one of two situations exist. Either the CID appears in the   pcp[]    table as part of a complete entry, or the CID appears in the   pcp[)    table for reregistration purposes only (no valid PID and PUA associated with CID and   CID 4¯REREG    flag is set). Because the CID has reregistration permission there is no dependency on the general operating mode. Further actions depend on the existence of the configuration file on the NDD. See "Checking For The Configuration File" directly below.  



  Reregistration Rev 1.4 Page 6-8
Release 6.2 Checking For The Configuration File
A check of the NDD is made for the target CID's configuration file if either of two sets of criteria is fulfilled. These are:
 1. The CID is not found in the PCP Tables.



   And
 The No-Reregistration mode is in effect.



   2. The CID is found in the PCP Tables.



   And
 The CID has reregistration permission.



  Further actions depend on the existence of the configuration file on the NDD.



  6.2.1 Configuration File Is Not Found
If the configuration file is not found, a CID response packet containing the Bogus CID will be returned to the requester. The receipt of a CID response packet containing the Bogus CID as the result of a manually entered CID, as in all cases, is treated as negative response. The Bogus configuration file is not requested.

 

  The unit maintains whatever configuration it had at the time of the request. No changes to the PCP tables are made.



  6.2.2 Configuration File Is Found
If the configuration file is found, registration/reregistration of the CID can take place. Further actions depend on the existence of the CID in the   pcp]    table.



  6.2.2.1 CID Found In PCP Tables
At this point, if the configuration file is found and the CID appears in the PCP Tables, the CID must be able to reregister.



  Reregistration of the CID can take place as follows:
 1. The NEMAC task sends a Kill Packet to the PUA of the unit
 currently associated with the CID, the "Old Unit".



   2. When the Old Unit receives the Kill Packet, it clears its
 LUA and LE(s) thus disabling the unit.



   3. NEMAC then deletes the CID along with the associated PID  
Reregistration Rev 1.4 Page 6-9
Release
 and PUA from the PCP tables, and add the CID, PID and PUA
 contained in the original (New) CID registration packet.



   4. A CID response packet containing the valid CID is returned
 to the original requester.



  Steps one and two are needed to avoid two units using the same configuration and therefore the same LUA.



  6.2.2.2 CID Not Found In PCP Tables
At this point, if the configuration file is found but the CID does not appears in the PCP Tables, the CID must be able to register for the first time. Registration of the CID can take place as follows:
 1. NEMAC adds the specified CID along with the PID and PUA
 contained in the CID registration packet to PCP tables.



   2. A CID response packet containing the valid CID is returned
 to the requester.



  6.3 Selective Reregistration, Summary
Selective reregistration strictly controls reregistration activities. Only CIDs which have been given reregistration permission are allowed to become associated with a new phone's PID. The
CID previously associated with the phone is gone, deleted from the PCP tables.



  7.0 Deregistration
Unlike reregistration, deregistration is performed exclusively form the NetMan console. Since deregistration is largely an operation performed by the NEMAC task, no operation need take place on the phone unit. In addition, deregistration seems like an operation which should be limited to use by the system administrator.



  Deregistration is initiated by issuing the appropriate command at the NetMan-PC console. Using a SCSI level Control Packet, the
NetMan-PC instructs the NEMAC task on the NMIG to remove  
Reregistration Rev 1.4 Page 7-10
Release references to the specified CID from the PCP tables.



  The NEMAC task searches the PCP tables for the specified CID.



  Depending on the results of this search the following actions are taken.



  7.1 CID   ts    Found
If the CID is found:
 1. The NEMAC task sends a Kill Packet to the PUA associated
 with the CID.



   2. When the unit receives the Kill packet, it clears its LUA
 and   tE(s)    thus disabling the unit.



   3. NEMAC then deletes the CID along with the associated PID
 and PUA from the PCP table.



  Steps one and two are needed to disable the unit. The unit is left in a state where it can accept a new manually entered CID.



  7.2 CID Is Not Found
If the CID is not found, no deregistration can take place. The only action taken is the generation of an event, sent to the event log, indicating deregistration did not take place because no CID was found.  



  Global Reregistration from an
Overall System Viewpoint.
EMI260.1     


<tb>



   <SEP> Idle <SEP> Unit <SEP> Able <SEP> to <SEP> Accept <SEP> CID <SEP> Input <SEP> from <SEP> Key <SEP> Pod
<tb>  <SEP> | <SEP> C;D <SEP> Entered <SEP> at <SEP> Unit <SEP> -No <SEP> Conng <SEP> Filt <SEP> found
<tb>  <SEP> -Unit <SEP> Sends <SEP> Reregistrotion <SEP> -CID <SEP> Response <SEP> Pkt <SEP> Sent
<tb>  <SEP> Packet <SEP> to <SEP> NetMan <SEP> to <SEP> Unit <SEP> w/ <SEP> Eiogus <SEP> C10
<tb>  <SEP> NetMcn <SEP> to <SEP> NctMan <SEP> to <SEP> Unit <SEP> w/ <SEP> Bogus <SEP> CID
<tb>  <SEP> for <SEP> C!Ds <SEP> Can <SEP> fig <SEP> Fiie
<tb>  <SEP> I <SEP> an <SEP> SCSI <SEP> DISi < .
<tb>



   <SEP> 1
<tb>  <SEP> Checitina <SEP> for <SEP> Canfig <SEP> File <SEP> on <SEP> ZCSI <SEP> Disk
<tb>  <SEP> -Config <SEP> file <SEP> Found
<tb>  <SEP> start <SEP> Checking <SEP> PCP <SEP> Tables
<tb>  <SEP> for <SEP> the <SEP> Specified <SEP> CID
<tb>  <SEP> 1
<tb> r <SEP> Checing <SEP> PCP <SEP> T.blel <SEP> f.r
<tb>  <SEP> -NetMan <SEP> Sends <SEP> Kfll <SEP> Packet <SEP> to <SEP> -Add <SEP> CID <SEP> w/ <SEP> New <SEP> PUA <SEP> a <SEP> PlO
<tb>  <SEP> Old <SEP> Unit <SEP> to <SEP> PCP <SEP> Tables
<tb>  <SEP> -Old <SEP> Unit <SEP> Gives <SEP> Up <SEP> LUA <SEP> -Send <SEP> CID <SEP> Response <SEP> Pocket
<tb>  <SEP> -NtUlan <SEP> Deletes <SEP> P10/CO/PUA <SEP> to <SEP> New <SEP> Unit
<tb>  <SEP> From <SEP> PCP <SEP> Tables
<tb>  <SEP> -Add <SEP> CID <SEP> w/ <SEP> New <SEP> PUA <SEP> a <SEP> P1D
<tb>  <SEP> to <SEP> PCP <SEP> Tables
<tb>  <SEP> -Send <SEP> CID <SEP> Response <SEP> 

   Packet
<tb>  <SEP> to <SEP> New <SEP> Unit
<tb> L <SEP> Complcte <SEP> 1
<tb>  <SEP> CID <SEP> Reregistration <SEP> Complete
<tb> 
Figure 1.  
EMI261.1     
   No-registration Mode Set.



  Selective Reregistration Not In Use.     
EMI262.1     




     Global Reregistration Mode Set.



  Selective Reregistration Not In Use.     
EMI263.1     




     No-registration Mode Set.



  Selective Reregistration In Use.     
EMI264.1     




     No-reregistration Mode Set.



  Selective Reregistration Not In Use.     



  Reregistration Rev 1.4 Page 9-12
Release 9.0 Figure 2.  



  Reregistration Rev 1.4 Page 10-13
Release 10.0 Appendix A, Glossary of Acronyms
 Bogus CID The "Bogus CID (value 0) is a special CID which
 is used to identify a configuration that if
 loaded into a unit, limits the unit's operation
 to dealing with manually entered CIDs. The
 receipt of a CID response packet containing the
 Bogus CID as the result of a manually entered CID
 is treated as negative response. The Bogus con
 figuration file is not requested. The unit main
 tains whatever configuration it had at the time
 of the request.



   CID Configuration Identifier. This sixteen bit value
 identifies unit configuration images on the
 NetMan-PC (and downstream from that point). CIDs
 are created by the system administrator at the
 NetMan-PC. A unit's phone extension number can be
 used as the CID but this does not necessarily
 need to be true. Since each phone needs a con
 figuration, MAPIs will have up to eight CIDs
 while an API will have only one. See also, Bogus
 CID.

 

   Kill Packet The Kill Packet is used to deconfigure a unit. It
 contains the CID of the phone to be killed. This
 information is useful to MAPIs since only a
 single phone on a MAPI may need to be decon
 figured while maintaining the configuration of
 other phones. The receipt of a Kill Packet by a
 unit will cause the unit to clear the LUA and LE
 associated with the specified CID.



   LLSI Logical Level SCSI Interface.   TheLLSI    lies above
 the Low Level SCSI driver. The function of the
 LLSI is to dispatch processed SCSI Level Control
 Packets (SLCPs) to the appropriate applications
 level task   (NBU,    NEMAC, etc).



   NBC Network Boot Card contains a SCSI interface
 controller, a 3.5 inch SCSI hard disk, and a DSP
 unit for conference call processing.



   NBU Network Boot Unit. Historically NBU refers to the  
Reregistration Rev 1.4 Page 10-14
Release
 physical unit responsible for booting nodes on
 the network. After various design changes NBU has
 come to refer to the task running on the NMIG's
   IOP    which performs this function.



   NCIN New Configuration Image Notification packet. A
 NCIN Packet is a Signalling Packet which notifies
 a unit it has a new Configuration Image available
 to it on the NBU. The NCIN packet contains a
 valid CID which the receiving unit will use to
 request a new Configuration Image. The NCIN
 Packet should not contain the Bogus CID.



   NDD Network Data Disk. The NDD is a synonym for the
 SCSI hard disk on the NBC card.



   NEMAC Network Event Management And Control. The NEMAC
 is a task which runs on the NMIG's   IOP.    It is
 responsible for monitoring event messages gener
 ated by nodes on the network and to transmit
 control messages from the NetMan-PC to the net
 work nodes.



   NetMan The term NetMan has historically been used to
 encompass all the hardware and software as
 sociated with network management. For the pur
 poses of this document the term "NetMan" includes
 the NetMan-PC, the NMIG and all software con
 tained therein.



   NetMan-PC Network Manager PC. The personal computer or work
 station which provides the network management
 user interface.



   NMIG Network Management Interface Group. The NMIG is a
 board group consisting of an   IOP    card and an NBC
 card. It interfaces with the NetMan-PC through
 the NBC's SCSI bus. The NMIG's   IOP    executes the
 network booting and network monitoring software.



   PCP PID-CID-PUA tables. At installation time a unit
 will register with the NMIG's NEMAC task. The
 NEMAC (Network Event Monitoring And Control) task
 will keep tables which relate PIDs to CIDs to
 PUAs, the PCP tables. The NEMAC will not need to  
Reregistration Rev 1.4 Page 10-15
Release
 search on LUAs, therefore LUAs are not included
 in the PCP tables. The PCP tables represent the
 working configuration map of the system. To
 protect these tables from loss due to such events
 as power failures, the PCP tables will be saved
 on the NMIG local SCSI disk (NDD). Any modifica
 tion to the tables will be recorded in the disk
 resident copy. On reboot, for any reason, the
 disk resident PCP tables will be read into
 memory.



   PID Physical Identifier. This is a general term
 meaning the unit's serial number in the case of a
 API and the cabinet/slot/port number in the case
 of a MAPI and TIOP.



   Port A port is a communications end point. A MAPI has
 eight ports to which phone units are attached. A
 TIM has up to twenty-four ports to which trunk
 lines are attached.



   PUA Physical Unit Address. This address is a unit's
 serial number. A unit will have only one PUA no
 matter how many ports the unit has.



   SLAP SCSI Level Access Point. SLAPs are service access
 points present in the Logical Level SCSI Inter
 face (LLSI) which relate SLCP Command Types to
 the processing of the SLCP. An applications level
 task may register with the   LLSI    to control the
 handling of all SLCPs with a given Command type.



   Only one applications task may register for a
 given SLAP.



   SLCP SCSI Level Control Packet. The NetMan sends
 commands to the NEMAC task through SCSI Level
 Control Packets. A SLCP is a special vendor
 specific SCSI command. In addition to SCSI con
 trol information, SLCP contain:
 a. A one byte Command Type field.



   b. A two byte Sequence Number field.



   c. A variable length Command Dependent Data
 field.



   TIM Trunk Interface Module. A group of cards made up  
Reregistration Rev 1.4 Page 10-16
Release
 of an   IOP    and up to three trunk cards.



   TrkGrp Trunk Group. A Trunk group is a logical grouping
 of Trunk Ports organized on the NetMan database.



   They can be physically distributed. A TrkGrp
 could consist of all the ports on a TIM, or it
 could be composed of selected ports on various
 TIMs.



   TSR Terminate-and-Stay-Resident. A TSR program has
 come to be defined as a progran running on an IBM
 PC which remains in memory even after it has
 terminated. Some external event (for example, a
 key stroke or activity at a serial port) will
 cause the TSR to reactivate. TSRs give batch
 operating system such as MS-DOS some small degree
 of multitasking capability.  



  Reregistration Rev 1.4 Page 11-17
Release   ll.o    Appendix B, Modes of Registration Illustrated
The following illustrations attempt to show the behavior of the network under various circumstances. They are intended for the non-technical reader.  



  Reregistration Rev 1.4
Release
 TABLE OF CONTENTS 1.0 Introduction () ........................................ 1-1 2.0 General Operating Modes () ............................. 2-2 3.0 No-Registration Mode () ................................ 3-3 4.0 No-Reregistration Mode () .............................. 4-3 5.0 Global Reregistration Mode () .......................... 5-3
 5.1 System Actions Under Global Reregistration.

  ......... 5-4
 5.1.1 Configuration File Is Not Found ................ 5-4
 5.1.2 Configuration File Is Found .................... 5-4
 5.1.2.1 CID Is Found .............................. 5-4
 5.1.2.2 CID Is Not Found .......................... 5-5
 5.2 Global Reregistration, Summary ...................... 5-5 6.0 Selective Reregistration () ............................ 6-5
 6.1 System Actions For Selective Reregistration ......... 6-6
 6.1.1 CID Is Not Found In PCP Tables ................. 6-6
 6.1.1.1 No-Registration Mode In Effect ............ 6-6
 6.1.1.2 No-Reregistration Mode In Effect .......... 6-7
 6.1.2 CID Is Found In PCP Tables ..................... 6-7
 6.1.2.1 CID Does Not Have Reregistration Permission 6-7
 6.1.2.2 CID Has Reregistration Permission ......... 6-7
 6.2 Checking For The Configuration File ................. 

   6-8
 6.2.1 Configuration File Is Not Found ................ 6-8
 6.2.2 Configuration File Is Found .................... 6-8
 6.2.2.1 CID Found In PCP Tables ................... 6-8
 6.2.2.2 CID Not Found In PCP Tables ............... 6-9
 6.3 Selective Reregistration, Summary ................... 6-9 7.0 Deregistration () ...................................... 7-9
 7.1 CID Is Found ........................................ 7-10
 7.2 CID Is Not Found .................................... 7-10 8.0 Figure 1. ()   8-11    9.0 Figure 2. () ........................................... 9-12 10.0 Appendix A, Glossary of Acronyms () ...................10-13 11.0 Appendix B, Modes of Registration   Illustrate    () 11-17 

Claims

WHAT IS CLAIMED IS: Boot Claims 1. A method for transmitting boot images to a number of nodes in a network, comprising: the step, performed continuously, of generating a periodic timing mark to define a series of cycles wherein (i) at least one interval within each cycle is designated a signalling packet ("SP") interval, and (ii) a plurality of other intervals within each cycle are designated timeslots; the step, performed by a network boot unit ("NBU"), of transmitting a boot control signalling packet ("BCSP") in a given SP interval, wherein the BCSP (i) contains boot control information signifying that a boot image is to be transmitted, (ii) specifies at least one times lot in which the boot image is to be transmitted in later cycles, and (iii) contains image descriptor information identifying the boot image;
and the steps, performed by the NBU, of transmitting boot packets, each containing a portion of the identified boot image, within the specified timeslot or timeslots for each of a number of cycles subsequent to the frame in which the BCSP was transmitted.
2. The method of claim 1, wherein the step of transmitting a boot image is performed over successive cycles.
3. The method of claim 1, and further comprising the steps, performed by a node requiring a particular type of boot image, of: testing for a predetermined time for the presence of a BCSP specifying the particular type of boot image; and in the absence of a BCSP within the predetermined time, transmitting a boot request signalling packet ("BRSP") specifying the particular type of boot image.
4. The method of claim 1, and further comprising the step, carried out by the NBU prior to the step of transmitting boot packets, of claiming at least one timeslot.
5. The method of claim 4 wherein the claiming step includes the substeps of: determining a timeslot that is believed to be free; transmitting a claiming packet unique to the NBU on that timeslot; listening to that timeslot; and verifying the receipt of the claiming packet as sent.
6. The method of claim 1 wherein the step of transmitting a BCSP is performed simultaneously on a plurality of channels and wherein the step of transmitting boot packets is performed on a single channel.
7. The method of claim 1 wherein the step of transmitting a BCSP is repeated after at least one boot packet has been sent.
8. A method wherein a plurality of network boot units ("NBU's") in a network determine which NBU is to respond to a boot request signalling packet ("BRSP") specifying a particular boot image, comprising: the step, performed continuously, of generating a periodic timing marks to define a series of cycles wherein (i) at least one interval within each cycle is designated atsignalling packet ("SP") interval, and (ii) a plurality of additional intervals within the cycle are designated timeslots;
and the steps, performed by each NBU having access to the particular boot image, of transmitting a boot control signalling packet ("BCSP") during the SP interval, the BCSP for each NBU identifying that NBU as the source, testing for the reception of a BCSP, determining if the first BCSP received originated from itself, and assuming the status of master NBU if and only if the first received BCSP did originate from itself.
9. The method of claim 8, and further comprising the steps, performed by the master NBU, of transmitting a boot control signalling packet "(BCSP") in a given SP interval, wherein the BCSP (i) contains boot control information signifying that a boot image is to be transmitted, (ii) specifies at least one timeslot in which the boot image is to be transmitted in later cycles, and (iii) contains image descriptor information identifying the particular boot image; and transmitting boot packets, each containing a portion of the particular boot image, within the specified timeslot or timeslots for each of a number of cycles subsequent to the frame in which the BCSP was transmitted.
Skew Calculation Claims 10. A method for transmitting information from a node in a specified timeslot in a time-division multiplexed communication system having a unidirectional transmitting bus terminating at a head-end and translated at said head-end onto a unidirectional receiving bus originating from said head-end, comprising the steps of: transmitting a test signal on said transmitting bus from said node; receiving said test signal from said receiving bus at said node; calculating the elapsed time between said transmitting and receiving steps; and transmitting an information signal an amount of time equal to said elapsed time prior to a time of arrival of said times lot on said receiving bus at said node; 11. The method of claim 10 further comprising the step of digitizing a voice signal to produce said information signal.
12. The method of claim 10 wherein said transmitting an information signal step includes asynchronously transmitting said information within said timeslot.
13. The method of claim 10 further comprising the steps of: generating a periodic timing mark, with the periods between said timing marks being frames, each frame having a plurality of timeslots; transmitting information signals to a second node in said specified timeslot in first frames, said first frames occurring every other frame; and receiving information signals from said second node in said specified timeslot in second frames, said second frames occurring between said first frames.
14. The method of claim 13 wherein said step of generating a periodic timing mark includes receiving a timing signal from a public switched network and using said public switched network timing signal to produce said timing marks.
15. A communication system for exchanging information between a plurality of nodes, comprising: a unidirectional transmitting medium coupling each of said nodes to a head-end of said transmitting medium; a unidirectional receiving medium extending from an originating end to each of said nodes; head-end translating means for transferring signals received at said head-end of said transmitting medium to said originating end of said receiving medium; means for generating a periodic timing mark on said receiving medium, each interval between a pair of timing marks being a frame, each frame defining a plurality of timeslots; means for transmitting a test signal from a first node on said transmitting medium; means for receiving said test signal at said first node on said receiving medium;
; means for calculating an elapsed skew time between the transmitting and receiving of said test signal; and means for transmitting information for a specified timeslot an amount of time equal to said skew time prior to the arrival of said specified timeslot at said receiving means.
16. The communication system of claim 15 further comprising means, coupled to said first node, for digitizing a voice signal to produce said information.
17. The communication system of claim 16 wherein said transmitting medium and said receiving medium are separate frequency channels on a single physical medium and said translating means is a frequency translator.
18. The communication system of claim 17 further comprising a plurality of means for digitizing
voice signals, each digitizing means being coupled to one of said nodes, each of said nodes having a separate address, and a plurality of memories, each coupled to one of said nodes for storing the addresses of said nodes.
19. The communication system of claim 18 further comprising a plurality of transmitting and receiving channels on said physical medium, each of said nodes having means for transmitting and receiving on more than one channel.
Voice Telephone Link Claims 20. A method for claiming a timeslot for voice transmissions at one node in a network over a medium, comprising the steps of: (a) providing a periodic timing mark on said medium, each timing mark being followed by a plurality of timeslots; (b) monitoring, at each node, timeslots following said timing mark for the presence of messages; (c) storing in a memory at each node a list of occupied timeslots; (d) transmitting, at an originating node a dummy message in a claimed, random one of the unoccupied timeslots as determined from said memory list; (e) monitoring said medium for reception of said transmitted dummy message; (f) comparing a received dummy message to the transmitted dummy message; (g) repeating steps (a) through (f) if the transmitted and received dummy messages are not substantially similar;
; (h) transmitting a series of dummy messages in said claimed timeslot to keep the claimed timeslot occupied; (i) updating said memory list in other nodes to indicate said claimed timeslot as being occupied; (j) transmitting a signalling packet from said originating node having a destination address, an originating address, and the location of said claimed timeslot; (k) monitoring said medium for a response to said signalling packet; (1) receiving a responsive signalling packet designating a claimed response timeslot; and (m) transmitting voice data in said claimed timeslot and converting voice data in said return timeslot into voice signals.
21. The method of claim 20 wherein said medium includes a plurality of frequency channels and further comprising the step of sending said signalling packet over each of said channels, said monitoring for a response step being done on a home channel containing said claimed timeslot.
22. The method of claim 20 further comprising the steps of: (n) receiving, at a receiving node, said signalling packet addressed to said receiving node; (o) transmitting a second dummy message in a response timeslot having a predetermined relationship to said claimed timeslot; (p) monitoring said medium for reception of said transmitted second dummy message; (q) receiving said second dummy message; (r) comparing said received second dummy message to the transmitted second dummy message; (s) repeating steps (o) through (r) if said stored second dummy message and received dummy message are not substantially similar; (t) transmitting a signalling packet addressed to said originating node indicating that voice communication has been established; (u) transmitting a series of second dummy messages in said response timeslot to keep said response timeslot occupied;
and (v) sending voice transmissions in said response timeslot.
23. The method of claim 22 further comprising the step of adding said reverse timeslot to said memory list of occupied timeslots at said other node.
24. The method of claim 22 further comprising the steps of: determining whether said receiving node is busy with another transmission; and sending a signalling packet to said originating node indicating that said receiving node is busy if said receiving node is busy.
25. The method of claim 24 wherein said medium has a plurality of channels and further comprising the steps of: determining whether said originating node is on the same channel as said receiving node; transmitting a signalling packet to an additional node when said receiving and originating nodes are on different channels and said receiving node is busy, said signalling package indicating that said receiving node is busy; retransmitting, at said additional node, said signalling packet from said receiving node to said originating node on the frequency channel of said originating node.
26. A method for claiming a timeslot for voice transmissions at one node in a network over a medium, comprising the steps of: (a) providing a periodic timing mark on said medium, each timing mark being followed by a plurality of timeslots; (b) monitoring, at each node, timeslots following said timing mark for the presence of messages; (c) storing in a memory at each node a list of occupied timeslots; (d) transmitting, at an originating node a dummy message in a claimed, random one of the unoccupied timeslots as determined from said memory list; (e) monitoring said medium for reception of said transmitted dummy message; (f) comparing a received dummy message to the transmitted dummy message; (g) repeating steps (a) through (f) if the transmitted and received dummy messages are not substantially similar;
; (h) transmitting a series of dummy messages in said claimed times lot to keep the claimed timeslot occupied; (i) updating said memory list in other nodes to indicate said claimed timeslot as being occupied; (j) transmitting a signalling packet from said originating node having a destination address, an originating address, and the location of said claimed times lot; (k) monitoring said medium for a response to said signalling packet; (1) receiving a responsive signalling packet designating a claimed response timeslot; and (m) transmitting voice data in said claimed timeslot and converting voice data in said return timeslot into voice signals.
(n) receiving, at a receiving node, said signalling packet addressed to said receiving node; (o) transmitting a second dummy message in a response timeslot having a predetermined relationship to said claimed timeslot; (p) monitoring said medium for reception of said transmitted second dummy message; (q) receiving said second dummy message; (r) comparing said received second dummy message to the transmitted second dummy message; (s) repeating steps (o) through (r) if said stored second dummy message and received dummy message are not substantially similar; (t) transmitting a signalling packet addressed to said originating node indicating that said response timeslot has been claimed; (u) transmitting a series of second dummy messages in said response timeslot to keep said response timeslot occupied; and (v) sending voice transmissions in said response timeslot.
(w) determining whether said receiving node is busy with another transmission; (x) sending a signalling packet to said originating node indicating that said receiving node is busy if said receiving node is busy.
(y) determining whether said originating node is on the same channel as said receiving node; (z) transmitting a signalling packet to an additional node when said receiving and originating nodes are on different channels and said receiving node is busy, said signalling package indicating that said receiving node is busy; (aa) retransmitting, at said additional node, said signalling packet from said receiving node to said originating node on the frequency channel of said originating node.
Session claims 27. A method for establishing and maintaining a voice communication between nodes in a network, each node having at least one associated telephone
characterized by address information, comprising: the step, performed repetitively and continuously, of generating periodic timing marks to define a series of cycles wherein (i) at least one interval within each cycle is designated a signalling packet ("SP") interval, (ii) a plurality of other intervals within each cycle are designated voice time slots ("VTS"), and (iii) pairs of VTS's in each cycle define a voice circuit ("VC"); the steps, performed by the nodes in response to the first node receiving signals from its associated telephone of claiming a first VTS of an unused VC, of exchanging SP's; and of claiming the second VTS of the VC;
and the steps, performed by each of the first and second nodes, of inserting voice data in their respective claimed VTS's, each node generating the voice data on the basis of signals received from its associated telephone for transmission to the other node and applying voice data as received from the other node to its associated phone.
28. The method of claim 27, wherein the first mentioned step of claiming a VTS comprises the substeps of: ascertaining the apparent availability of a particular VTS; transmitting a Claiming Voice Packet ("CVP") within the apparently available VTS; and verifying the receipt of the CVP intact to indicate the absence of collision.
29. The method of claim 28 wherein each node is capable of communication on any of a plurality of frequency channels, and wherein the steps of exchanging SP's includes the substep, performed by the first node of sending a Call Request SP on each of the channels, specifying a single channel for response.
30. The method of claim 28 wherein each cycle contains first and second frames, each frame including an SP interval and a plurality of VTS's, with any VC consisting of corresponding VTS's from the first and second frames.
31. A method for establishing and maintaining a voice communication between nodes in a network, each node having at least one associated telephone characterized by address information, comprising: the step, performed repetitively and continuously, of generating periodic timing marks to define a series of cycles wherein (i) at least one interval within each cycle is designated a signalling packet ("SP") interval, (ii) a plurality of other intervals within each cycle are designated voice time slots ("VTS"), and (iii) pairs of VTS's in each cycle define a voice circuit ("VC"); the step, performed by a first node in response to signals from its associated telephone indicating an off-hook condition and a combination of keystrokes indicating a call to be placed to a second node, of claiming a first VTS of an unused VC;
; the step, performed by the first node in response to successfully claiming the first VTS, of transmitting a Call Request SP to the second node; the step, performed by the second node in response to receiving the Call Request SP, of sending an Accept SP or a Busy SP to the first node; the steps, performed by the first node in response to receiving the Accept SP, of transmitting an ACK SP to the second node, and applying a ringback signal or a busy signal to its own associated phone; the step, performed by the second node in response to receiving the ACK SP, of causing its own associated phone to ring; the step, carried out by the second node in response to signals from its associated phone indicating an off-hook condition, of claiming the second VTS of the VC;
; the step, performed by the second node in response to successfully claiming the second VTS, of sending an Answer SP to the first node; the step, performed by the first node in response to receiving the Answer SP, of sending an ACK SP to the second node; and the steps, carried out by each of the first and second nodes, of inserting voice data in their respective claimed VTS's, each node generating the voice data on the basis of signals received from its associated telephone for transmission to the other node and applying voice data as received from the other node to its associated phone.
32. 32. The method of claim 31, wherein the first mentioned step of claiming a VTS comprises the substeps of: ascertaining the apparent availability of a particular VTS; transmitting a Claiming Voice Packet ("CVP") within the apparently available VTS; and verifying the receipt of the CVP intact to indicate the absence of collision.
33. The method of claim 31 wherein each node is capable of communication on any of a plurality of frequency channels, and wherein said step of sending a Call Request SP includes the substeps of sending a Call Request SP on each of the channels, specifying a single channel for response.
34. The method of claim 31 wherein each cycle contains first and second frames, each frame including an SP interval and a plurality of VTS's, with any VC consisting of corresponding VTS's from the first and second frames.
Time-Frequency Multiplexing 35. A system for transmitting messages to and from nodes over a network broadband medium, comprising: a plurality of head-end means, coupled to one end of said network medium, for receiving said messages in a first frequency band and retransmitting said messages over said network medium in a second frequency band, said first and second frequency bands being a channel, each of said head-end means operating on a different channel; a timing mark generator coupled to said network medium for simultaneously producing periodic timing marks on all of said channels; a plurality of clock generators, each coupled to a different one of said head-end means, for producing the clock signals for said head-end means;
; a plurality of phase lock loops, each coupled to a different one of said head-end means, for phase lock synchronizing said clock signals to a master clock; and a plurality of digital phase lock loop means, each coupled to a different one of said head-end means, for producing a fractional offset of the bits of a message in a timeslot following one of said timing marks to synchronize said message with said clock signals.
36. The system of claim 35 further comprising means, coupled to said head-end means, for examining the contents of each timeslot and inserting a bit pattern for synchronization in the absence of a message.
37. The system of claim 35 further comprising a plurality of second phase lock loops, each coupled to a different one of said head-end means, for phase synchronizing each said clock generator to an external clock; and logic means for selecting one of the outputs of said second phase lock loops as said master clock.
38. The system of claim 35 wherein a first or last portion of each said times lot contains no data to allow said digital phase lock loop means to reset.
39. A system for transmitting messages to and from nodes over a network broadband medium, comprising: a plurality of head-end means, coupled to one end of said network medium, for receiving said messages in a first frequency band and retransmitting said messages over said network medium in a second frequency band, said first and second frequency bands being a channel, each of said head-end means operating on a different channel; a timing mark generator coupled to said network medium for simultaneously producing periodic timing marks on all of said channels; a plurality of clock generators, each coupled to a different one of said head-end means, for producing the clock signals for said head-end means; a plurality of phase lock loops, each coupled to a different one of said head-end means, for phase lock synchronizing said clock signals to a master clock;
; a plurality of digital phase lock loop means, each coupled to a different one of said head-end means, for producing a fractional offset of the bits of a message in a times lot following one of said timing marks to synchronize said message with said clock signals; means, coupled to said head-end means, for examining the contents of each times lot and inserting a bit pattern for synchronization in the absence of a massage;
a plurality of second phase lock loops, each coupled to a different one of said head-end means, for phase synchronizing each said clock generator to an external clock; logic means for selecting one of the outputs of said second phase lock loops as said master clock; and wherein a first or last portion of each said timeslot contains no data to allow said digital phase lock loop means to reset.
40. The system of claim 39 wherein said digital phase lock loop means comprises: a shift register having a data input coupled to receive said received message and a clock input coupled to a head-end clock having a frequency at least four times the frequency of said received data; and means for selecting an output of said shift register corresponding to a minimum phase difference between said received data and said head-end clock.
MLD Claims 41. A digital phase lock circuit in a head-end of a transmission system for synchronizing a head-end clock to a digital received message to be provided to a transmitter in said head-end unit for retransmission on said medium, comprising: a shift register having a data input coupled to receive said received message and a clock input coupled to a head-end clock having a frequency at least four times the frequency of said received data; and means for selecting an output of said shift register corresponding to a minimum phase difference between said received data and said head-end clock.
IOP Claims 42. An interface circuit for coupling a plurality of head-end units to a plurality of trunk interfaces to trunk telephone lines, each of said headend units having a receiver for receiving transmissions from said medium at a first frequency and converting said transmissions to a second frequency in a transmitter for transmission back over said medium, comprising: a plurality of interface circuits, each for coupling one of said head-end units to a multiple timeslot full-duplex bus; a data buffer for coupling said full-duplex bus to a trunk bus; a trunk address decoder and buffer for providing addresses to said trunk bus; a processor for providing control signals to said interface circuits and address decoder and buffer;
and a phase lock loop circuit for synchronizing a local clock to a clock signal received from at least one of said head-end units.
43. The node hardware as shown and described.
PCT/US1989/001806 1989-04-28 1989-04-28 Distributed intelligence network using time and frequency multiplexing WO1990013956A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/US1989/001806 WO1990013956A1 (en) 1989-04-28 1989-04-28 Distributed intelligence network using time and frequency multiplexing
JP50875889A JPH04506729A (en) 1989-04-28 1989-04-28 Distributed intelligence network using time and frequency multiplexing
EP19890909268 EP0470072A4 (en) 1989-04-28 1989-04-28 Distributed intelligence network using time and frequency multiplexing
KR91701479A KR970008669B1 (en) 1989-04-28 1991-10-28 Distributed intelligence network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1989/001806 WO1990013956A1 (en) 1989-04-28 1989-04-28 Distributed intelligence network using time and frequency multiplexing

Publications (1)

Publication Number Publication Date
WO1990013956A1 true WO1990013956A1 (en) 1990-11-15

Family

ID=22214970

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1989/001806 WO1990013956A1 (en) 1989-04-28 1989-04-28 Distributed intelligence network using time and frequency multiplexing

Country Status (4)

Country Link
EP (1) EP0470072A4 (en)
JP (1) JPH04506729A (en)
KR (1) KR970008669B1 (en)
WO (1) WO1990013956A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499241A (en) * 1993-09-17 1996-03-12 Scientific-Atlanta, Inc. Broadband communications system
US5581555A (en) * 1993-09-17 1996-12-03 Scientific-Atlanta, Inc. Reverse path allocation and contention resolution scheme for a broadband communications system
US5594726A (en) * 1993-09-17 1997-01-14 Scientific-Atlanta, Inc. Frequency agile broadband communications system
US8031740B2 (en) 2008-10-14 2011-10-04 Mitsubishi Electric Corporation Time division multiple access communication network system
CN103021196A (en) * 2011-09-26 2013-04-03 现代摩比斯株式会社 Method for transporting traffic information
KR101932539B1 (en) 2013-02-18 2018-12-27 한화테크윈 주식회사 Method for recording moving-image data, and photographing apparatus adopting the method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7206320B2 (en) * 2003-06-18 2007-04-17 Sony Corporation Method and apparatus for non-centralized network bandwidth management

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3893033A (en) * 1974-05-02 1975-07-01 Honeywell Inf Systems Apparatus for producing timing signals that are synchronized with asynchronous data signals
US4087627A (en) * 1976-10-12 1978-05-02 Nippon Telegraph & Telephone Public Corporation Clock regenerator comprising a reversible shift register and a controllable frequency divider
US4564940A (en) * 1982-12-28 1986-01-14 Tokyo Shibaura Denki Kabushiki Kaisha Broad band network system
US4664526A (en) * 1984-09-22 1987-05-12 Peter Scheffler Process and apparatus for mixing a liquid sample to be analyzed
US4675866A (en) * 1984-04-24 1987-06-23 Nec Corporation Broadband network systems
US4694453A (en) * 1984-12-20 1987-09-15 Kabushiki Kaisha Toshiba System for adjusting signal transmission timing in time-division multiplexing signal transmission
US4750168A (en) * 1986-07-07 1988-06-07 Northern Telecom Limited Channel allocation on a time division multiplex bus
US4763320A (en) * 1984-07-06 1988-08-09 Messerschmitt-Bolkow-Blohm Gmbh Method and arrangement for transmitting data, especially in an aircraft
US4763319A (en) * 1986-05-19 1988-08-09 Bell Communications Research, Inc. Multi-rate synchronous virtual circuit network for voice and data communications
US4811338A (en) * 1986-04-14 1989-03-07 Kabushiki Kaisha Toshiba System for adjusting signal transmission timing to prevent signal collisions

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS598448A (en) * 1982-07-07 1984-01-17 Fuji Xerox Co Ltd Digital signal transmission system
US4534024A (en) * 1982-12-02 1985-08-06 At&T Bell Laboratories System and method for controlling a multiple access data communications system including both data packets and voice packets being communicated over a cable television system
JPS60185441A (en) * 1984-03-03 1985-09-20 Fuji Xerox Co Ltd System timing synchronizing system
NL8402364A (en) * 1984-07-27 1986-02-17 Philips Nv METHOD, STATION AND SYSTEM FOR TRANSMISSION OF MESSAGES CONTAINING DATA PACKAGES.
US4982430A (en) * 1985-04-24 1991-01-01 General Instrument Corporation Bootstrap channel security arrangement for communication network
GB8518133D0 (en) * 1985-07-18 1985-08-21 British Telecomm Communications network
JPS6292547A (en) * 1985-10-17 1987-04-28 Nippon Telegr & Teleph Corp <Ntt> Pulse form transmission equipment
JPS62181548A (en) * 1986-02-05 1987-08-08 Mitsubishi Electric Corp Local area network device
US4787082A (en) * 1986-07-24 1988-11-22 American Telephone And Telegraph Company, At&T Bell Laboratories Data flow control arrangement for local area network
US4789980A (en) * 1986-08-18 1988-12-06 American Telephone & Telegraph Company, At&T Bell Laboratories Switching techniques for FDM communication systems
PH27468A (en) * 1988-03-21 1993-07-23 First Pacific Communications C Communication system using distributed switching for time division multiplexing of voice and data
CA2009713A1 (en) * 1989-02-28 1990-08-31 Robert P. Mcnamara Local area network communication system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3893033A (en) * 1974-05-02 1975-07-01 Honeywell Inf Systems Apparatus for producing timing signals that are synchronized with asynchronous data signals
US4087627A (en) * 1976-10-12 1978-05-02 Nippon Telegraph & Telephone Public Corporation Clock regenerator comprising a reversible shift register and a controllable frequency divider
US4564940A (en) * 1982-12-28 1986-01-14 Tokyo Shibaura Denki Kabushiki Kaisha Broad band network system
US4675866A (en) * 1984-04-24 1987-06-23 Nec Corporation Broadband network systems
US4763320A (en) * 1984-07-06 1988-08-09 Messerschmitt-Bolkow-Blohm Gmbh Method and arrangement for transmitting data, especially in an aircraft
US4664526A (en) * 1984-09-22 1987-05-12 Peter Scheffler Process and apparatus for mixing a liquid sample to be analyzed
US4694453A (en) * 1984-12-20 1987-09-15 Kabushiki Kaisha Toshiba System for adjusting signal transmission timing in time-division multiplexing signal transmission
US4811338A (en) * 1986-04-14 1989-03-07 Kabushiki Kaisha Toshiba System for adjusting signal transmission timing to prevent signal collisions
US4763319A (en) * 1986-05-19 1988-08-09 Bell Communications Research, Inc. Multi-rate synchronous virtual circuit network for voice and data communications
US4750168A (en) * 1986-07-07 1988-06-07 Northern Telecom Limited Channel allocation on a time division multiplex bus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP0470072A4 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499241A (en) * 1993-09-17 1996-03-12 Scientific-Atlanta, Inc. Broadband communications system
US5581555A (en) * 1993-09-17 1996-12-03 Scientific-Atlanta, Inc. Reverse path allocation and contention resolution scheme for a broadband communications system
US5594726A (en) * 1993-09-17 1997-01-14 Scientific-Atlanta, Inc. Frequency agile broadband communications system
US5719872A (en) * 1993-09-17 1998-02-17 Scientific-Atlanta, Inc. Reverse path allocation and contention resolution scheme for a broadband communications system
US8031740B2 (en) 2008-10-14 2011-10-04 Mitsubishi Electric Corporation Time division multiple access communication network system
CN103021196A (en) * 2011-09-26 2013-04-03 现代摩比斯株式会社 Method for transporting traffic information
CN103021196B (en) * 2011-09-26 2016-01-13 现代摩比斯株式会社 Traffic information transferring method
KR101932539B1 (en) 2013-02-18 2018-12-27 한화테크윈 주식회사 Method for recording moving-image data, and photographing apparatus adopting the method

Also Published As

Publication number Publication date
EP0470072A1 (en) 1992-02-12
JPH04506729A (en) 1992-11-19
KR970008669B1 (en) 1997-05-28
EP0470072A4 (en) 1993-08-04

Similar Documents

Publication Publication Date Title
US5487066A (en) Distributed intelligence network using time and frequency multiplexing
US4866704A (en) Fiber optic voice/data network
US4750171A (en) Data switching system and method
CA2107047C (en) Switched circuit connection management over public data networks for wide area networks
JP2979319B2 (en) Base station for wireless digital telephone system
EP0100662B1 (en) Digital communication system
US4625308A (en) All digital IDMA dynamic channel allocated satellite communications system and method
US4805172A (en) Time division multiplex (TDM) switching system especially for pulse code modulated (PCM) telephony signals
EP0089159A1 (en) Timed token ring with multiple priorities
JPS58501155A (en) Free time slot acquisition and transmission device for loop communication systems
BG63358B1 (en) Expandable telecommunication system
FR2594614A1 (en) COMMUNICATIONS SWITCHING SYSTEM
JPS62277829A (en) Method and apparatus for data communication by employing a plurality of data links
JPH06197130A (en) High-speed packet switching device and method for routing data packet
JPH05505710A (en) ring communication system
EP0210593A2 (en) High-speed switching processor for a burst-switching communications system
US5842007A (en) Method and system for transferring high level control messaging framing and payload data in a serial stream in a communications system
US5680589A (en) Ring communication system using ISDN
EP0334569B1 (en) Method of and system for transmitting information
WO1990013956A1 (en) Distributed intelligence network using time and frequency multiplexing
AU4062589A (en) Distributed intelligence network
EP0210597A2 (en) Link switch for a burst-switching communications system
Hertweck et al. X25 based process—process communication
JPS5917751A (en) Data communication system
EP0211336A2 (en) Port circuit for coupling an end-user instrument with a port of a communications system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LU NL SE

WWE Wipo information: entry into national phase

Ref document number: 1989909268

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1989909268

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1989909268

Country of ref document: EP