1991_National_FDDI_Handbook 1991 National FDDI Handbook

User Manual: 1991_National_FDDI_Handbook

Open the PDF directly: View PDF PDF.
Page Count: 560

Download1991_National_FDDI_Handbook 1991 National FDDI Handbook
Open PDF In BrowserView PDF
42
2,0)

!
\

t

8!:r.
:::10
~::::J

~e!.

/1

l\
II

---

FODI

DATABOOK
1991 Edition

FOOl Overview
DP83200 FOOl Chip Set
Development Support
Application Notes and System Briefs
Appendix/Physical Dimensions
iii

••
•

III

TRADEMARKS
Following is the most current list of National Semiconductor Corporation's trademarks and registered trademarks.
ABiCTM
Abuseable™
Anadig™
ANS-R-TRANTM'
APPSTM
ASPECTTM
Auto-Chem Deflasher™
BCPTM
BI-FETTM
BI-FETIITM
BI-LiNETM
BIPLANTM
BLCTM
BLXTM
BMACTM
Brite-Lite™
BSITM
BTLTM
CDDTM
CheckTrack™
CIMTM
CIMBUSTM
CLASICTM
Cloc~ChekTM

COMBO'Chek™
MenuMaster™
Microbus™ data bus
MICRO-DACTM
p.talker™

Microtalker™
MICROWIRETM
MICROWIRE/PLUSTM
MOLETM
MPATM
MSTTM
Naked-8™
National®
National Semiconductor®
National Semiconductor
Corp.®
NAX800TM
Nitride PIUS™
Nitride Plus Oxide™
NMLTM
NOBUSTM
NSC800TM
NSCISETM
NSX-16TM
NS-XC-16TM
NTERCOMTM
NURAMTM
OXISSTM
p2CMOSTM
PC Master™
Perfect WatchTM
Pharm~ChekTM

PLANTM
PLANARTM
PLAYERTM
Plus-2TM
Polycraft™
POSilinkTM
POSitaiker™
Power + Control™
POWERplanar™
QUAD3000TM
QUIKLOOKTM
RATTM
RTX16TM

SABRTM
Scripl>'Chek™
SCXTM
SERIESI800™
Series 900TM
Series 3000TM
Series 32000®
Shelf,.....ChekTM
Simple Switcher™
SofChekTM
SONICTM
SPIRETM
Staggered RefreshTM
STARTM
StarlinkTM
STARPLEXTM
Super-Block™
SuperChipTM
SuperScript™
SYS32TM
TapePak®
TDSTM
TeleGate™
The National Anthem®
Time,.....ChekTM
TINATM
TLCTM
Trapezoidal™
TRI-CODETM
TRI-POLYTM
TRI-SAFETM
TRI-STATE®
TURBOTRANSCEIVERTM
VIPTM
VR32TM
WATCH DOGTM
XMOSTM
XPUTM
Z STARTM
883B/RETSTM
883S/RETSTM

ABELTM is a trademark of Data 1/0 Corporation.
GAL® is a registered trademark of Lattice Semiconductor.
IBM®, PC® and PC-AT c..>
x x

'" '"

Z

'">ti

()

!;(

6x

w

'"

>°

I

c

~

PLAYER
TTlSD

25

LBD+

CLKDET

24

LBD-

CRD EN

23

OSC FLTR+

DP83231

DATA+
DATA-

22

OSC FLTR-

TTL SO,

21

DIF AMP

ClK OET

TEST EN

10

20

OSC IN

AVec

11

19

OSC OUT

RXD :t

lBD :t,
ElB,

CRD EN

18
III



>

...'"
~

0

C

Z

C

Z

'" c'"

«

()

<.J

~

I

C
VI

+

c

VI

c..>

>

TL/F/103B4-2

Order Number DP83231AV
See NS Package Number V28A
TL/F/10384-4

FIGURE 2-2. DP83231 Pinout

FIGURE 2-3. System Connection Diagram

2-7

....

C")

N

C")

co

a.
C

3.0 Pin Descriptions
Symbol

Description

Pin No.

1/0

DATA + ,
DATA-

8,
9

I

DATA±: 4B/5B serial NRZI data inputs originating from a fiber optic receiver and presented for
the purpose of resynchronization and clock recovery: These differential100k ECl compatible
inputs are selected when the ElB input is at a logic low level.

lBD+,
lBD-

25,
24

I

loopback Data±: 4B/5B serial NRZI data inputs originating from a local PLAYER device and
presented for the purpose of station diagnostics. These differential 1Oak ECl compatible inputs
are selected when the ElB input is at a logic High level.

ElB

4

I

Enable loopback: TTL compatible input which selects between the DATA ± inputs or the lBD
± inputs. The lBD inputs are selected when the ElB" pin is at a logic High level and the DATA
inputs when at a logic low level.

ClKDET

6

0

Clock Detect: CMOS output used to indicate that the chip has detected the presence of a
continuous data frequency greater than 3.0 MHz. A logic High level on the output will indicate that
valid input data has been detected.

CRDEN

7

I

CRD Enable: TTL compatible input which directs the differential charge pump outputs to either
operate the crystal oscillator at the center of its operating range or to track out the VCO phase
errors in the second PlL. The CRD EN input will reset the ClK DET function and will force the
oscillator to the center of its operating range when at a logic lOW level and will allow normal Pll
tracking operation when at a logic High level. Deassertion of the CRD EN input will momentarily
stop the VCO.

OSCFlTR+,
OSCFlTR-

23,
22

0

Oscillator Filter ± : The differential charge pump up and down outputs which are part of the
second PlL. A three element filter should be connected to each of these pins which consists of
one capacitor in parallel with a resistor and another capacitor to ground. These outputs are driven
to their maximum upper operating level when the CRD EN pin is at a logic lOW level or when
valid data frequencies are not recognized at the data inputs.

DIFAMP
OUT

21

0

Differential Amplifier Output: The differential amplifier output associated with the second Pll
which is used to adjust the frequency of the external crystal.

OSC_IN,
OSC_OUT

20,
19

I

Oscillator Input and Output: The terminals for the crystal oscillator which require connection of
,
the crystal tank circuit, varactors, and capacitors.

RXC+,
RXC-

3,
2

0

Receive Clock: Differential 1OOK ECl receive clock outputs which operate at 125 MHz
synchronized to the selected inputs (NRZI DATA ± or lBD ±) when valid line state data is
present. When valid line state data is not present these outputs continue to operate at a nominal
frequency of 125 MHz ± 12 kHz. These outputs should be terminated externally with a
conventional ECl 500. equivalent load.

RXD+,
RXD-

27,
26

0

Receive Data: Differential 1OaK ECl received data outputs which provide a resynchronized
equivalent of the selected NRZI DATA or lBD inputs. The received data output transitions occur
concurrent with the falling edge of the RXC ± output. These outputs should be terminated
externally with a conventional ECl 500. equivalent load.

VCOFlTR

13

0

VCO Filter: low pass filter associated with the first PlL. A three element filter should be
connected to this pin which consists of one capaCitor in parallel with a resistor and another
capaCitor to ground.

SD+,
SD-

18,
17

I

Signal Detect: Differential inputs to a 1OaK ECl to TTL translator intended for conversion of the
fiber optiC receiver's ECl Signal detect to TTL for a player device. The inputs are used in the test
modes as inputs for single stepping and gating the VCO.

TTlSD

5

0

TTL Signal Detect: Intended to be a Signal detect output in TTL format for use by the PLAYER

chip.
TEST EN

10

DVcc

16

I

Test Enable: CMOS input which enables the test functions. This input must be at a logic low level
in normal operation.
Digital Vee: Positive power supply for most of the internal logic circuitry intended for + 5V
operation ± 5% relative to ground. Bypass capaCitors should be placed as close as possible
across the DVcc and DGND pins. DVcc, AVec and EXTVcc should be tied together through
chokes.

-"-

2-8

C

3.0 Pin Descriptions

"C

CO

(Continued)

W

I\)

Symbol

Pin No.

W
......

Description

I/O

EXTVee

28

External Vee: Positive power supply for all the input and output buffers intended for + 5V operation
± 10% relative to ground. Bypass capacitors should be placed as close as possible across the
EXTVee and EXTGND pins. DVee, AVec and EXTVee should be tied together at the device pins
through chokes.

DGND

15

Digital Ground: Power supply return for the internal circuitry. DGND. AGND and EXT GND pins
should be tied together.

EXTGND

1

External Ground: Power supply return for the input and output buffers. DGND, AGND and EXT GND
pins should be tied together.

AVec

11

Analog Vee: Positive power supply for the critical analog circuitry intended for + 5V operation ± 5 %
relative to ground. Bypass capacitors should be placed as close as possible across the AVec and
AGND pins. DVee, EXTVee and AVec should be tied together through chokes.

AGND

14

Analog Ground: Power supply return for the critical analog circuitry. DGND, EXTGND and AGND
pins should be tied together.

VCOBIAS

12

I

VCO Bias: TTL compatible input that sets the nominal frequency for the VCO by the selection of the
resistor value between this input and AVec. A 30 kD value for this resistor will provide nominally
125 M Hz on the RXC outputs.

4.0 Electrical Characteristics
ECL Signals
Output Current

4.1 ABSOLUTE MAXIMUM RATINGS
If Military/Aerospace specified devices are required,
please contact the National Semiconductor Sales
Office/Distributors for availability and specifications.
Storage Temperature

- 65°C to + 150°C

TTL Signals
Inputs
Outputs

-20 rnA

Supplies
EXTVee to EXTGND
DVeetoDGND
AVec to AGND

-0.5Vto +7V
-0.5Vto +7V
-0.5Vto +7V

ESD Susceptibility

5.5V
5.5V

2000V

4.2 RECOMMENDED OPERATING CONDITIONS
Parameter

Symbol

Min

Typ

Max

Units

4.75

5

5.25

V

VeetoGND

Power Supply

VIH

High Level
Input Voltage

TTL

2.0

ECl

Vee- 1.165

Vee - 0.880

low level
Input Voltage

TTL
Vee - 1.810

Vee - 1.475

IOH

High Level
Output Current

TTL Outputs
(Note 1)

-0.4

rnA

IOl

low Level
Output Current

TTL Outputs
(Note 1)

4.0

rnA

FVCO

VCO Frequency

Vil

ECL

FXTL

Crystal Frequency

TA

Operating Temperature

Note 1: TTL outputs include
Eel outputs include

V
0.8

250

MHz

10.416667
0

elK DET and TTLSD.
RXC± and RXD±.

2-9

25

V

MHz
70

°C

•

4.0 Electrical Characteristics (Continued)
4.3 DC ELECTRICAL CHARACTERISTICS
Symbol

Conditions

Parameter

VIC

Input Clamp Voltage

liN = 18mA

VOH

High Level
Output Voltage

TTL Outputs: IOH = -400/LA

VOL

Low Level
Output Voltage

ECL Outputs:
50n Load to Vee - 2V

Min

II

Max High Level
Input Current

TTL Inputs: VIN = 7V

IIH

High Level
Input Current

TTL Inputs: VIN = 2.7V

IlL

Low Level
Input Current

TTL Inputs: VIN = 0.4V

Ifilter

Charge Pump Current

Source

Units
V

VCC- 2

V
Vee - 880

mV

0.5

V

Vee - 1620

mV

100

/LA

-20

20

/LA

-20

20

/LA

-0.3

-0.7

mA

0.3

0.7

mA

-500

500

nA

Vee - 1025

TTL Outputs: IOL = 4 mA
ECL Outputs:
50n Load to Vee - 2V

Max
-1.5

Vee - 1810

Sink
TRI·STATE'"

Supply Current
180'
mA
ICC
'Includes 60 mA due to external EOl termination of two differential Signals.
For lOOk EOl output buffers, output levels are specHied as:
VOH--",ax = Vee - 0.88V
VOLmax = Vee - 1.62V
Since the outputs are differential, the average output level Is Vee - 1.25V. The test load per output is son at Vee - 2V. The external load current through this
50n resistor is thus:

Uoad = [(Vee - 1.25) - (Vee - 2)1/50A
= 0.015A
= 15 rnA
There are 2 pairs of differential EOl signals, so lhe total EOl current is 60 mA.
4.4 AC ELECTRICAL CHARACTERISTICS
Symbol

Parameter

Conditions

Tl

Phase Difference

T2

RXC Pos. Pulse Width

(Note 1)

T3

CLKDETTime

CRD EN Neg. Pulse Width = 1 /Ls
(Valid DATA ± Present)

T4
Valid Data Time
CROEN = High
Note 1: These parameters are not tested, but are assured by correlation with characterization data.

2·10

Min

Max

Units

-2

2

ns

3

5

ns

100

/Ls

100

/Ls

,----------------------------------------------------------------------, c
~
4.0 Electrical Characteristics (Continued)
Co)

...

N

TYPICAL WAVEFORMS

Co)

RXD

RXC

/-T3
elK DET

DATA :t:

elK DET
TLlF/l0384-5

FIGURE 4-1. DP83231 Timing Waveforms
DATA

CD

CRD
EN

-----'

------------------------~

LJ
~

RXC

r

m
TEST
EN

or
DATA

RXC
DIF
AMF

fII

In lock
~\----------------________~ln~l~oc~k_
_ _ _ _ _ _ _ _r
\ Centor Tuning Vollago
TL/F/l0384-6

FIGURE 4-2. Typical Waveforms

2-11

~
CO)

C"I

CO)
eX)

r----------------------------------------------------------------------------------------------,
4.0 Electrical Characteristics (Continued)

a.
Q

DATA

+ (Bit shift shown)

RXD +
RXC +
DATA +
1 __ 0
(Logic
Value) •

--r-

o
•

o

~

OP83231 Ganal1ltad
BR Capture Windows

Nominal
Window Cantor
/ .
(M.an Bit Position)

Window Truncation

Window Truncation
Id ••1 Window Width. tw

= Tvco = 8 ns - - - - i..
TLlF/l0384-7

FIGURE 4·3. Synchronization Window

iI ~~1

i1

7Pf

10kn

27pf

H

AGND

240 kn

GND

2.2kn

15pf

+5V

330pf

150pf

R=1.6Zo
OSC flTR
ClK

Olff.

OSC

AMP

OUT

ose veo
IN

R= 1.6Zo

_-+---+

flTR RXO+t---.....

DEl
R=2.6Zo

R=2.6Zo

TTLSD

ElB

DP83231
+5V

DATA :t

lBD i

R = 1.6 Io

R=1.6Io
SO i

EXT
DGND

GND

VCO
BIAS

AGNO

CRD
EN

---+

R X e : t - - - - t -....

R=2.6Io

R=2.6Io

Zo Is the line impedance

30kn
TLlF/l0384-8

All component values ± 5%.

FIGURE 4·4. General Wiring Diagram

2·12

r----------------------------------------------------------------------.c

;g

5.0 Detailed Information

Co)

Capacitance:

Crystals
C5400N

800A-A-10.41667-32

Frequency Calibration: ± 20 PPM
± 20 PPM

Aging:

<

Pull ability:

either a
;"0.021

• The crystal, asc FLTRs and the vca FLTA circuitries
should be connected to Ground on isolated branches off of
the DGND pin. If using a multilayered board with dedicated
Vee and Ground planes ensure that for the ground plane
that the ceramic resonator, asc FLTRs and the vca FLTR
circuitries have their own small isolated islands that are connected to the DGND and AGND pins as described above.

±10 PPM
motional

capacitance

of

or

• The DVee and AVec pins should be connected to Vee on
an isolated branches off of the EXTVee pin, preferably being connected through a ferrite bead or a small inductor.

a change of at least 100 PPM when
the CL is changed from 32 pF to 18 pF
and a change of -100 PPM when the
CL is changed from 32 pF to 50 pF.

• The DGND and AGND pins should be connected to GND
on an isolated branches off of the EXTGND pin. Connection
to the ground plane should be made only at the EXTGND
pin.

Varactors
• Manufacturer: Alpha Industries (617) 935-5150
Part#:

30 pF

• No TTL logic lines should pass through the crystal asc
FLTAs or vca FLTR circuitry areas to avoid the possibility
of noise due to crosstalk.

10.41667 MHz

Load Capacitance, CL: 32 pF
Frequency Stability
(0·C-70·C):

<

• The part should be bypassed between the EXTVee and
EXTGND as close to the chip as possible (preferably under
the chip using chip caps). The part should also be bypassed
between the DVee and DGND and the AVec and AGND as
close to the chip as possible.

Key Specifications:
Center Frequency:

Vr = 1V: C > 85 pF
Vr = 4V: 15 pF < C

5.2 LAYOUT RECOMMENDATIONS

• Manufacturer: Standard Crystal Corporation
(818) 443-2121
Part#:

Co)

@
@

• Manufacturer: Nel Frequency Controls (414) 763-3591
Part#:

N

....

Key Specifications:

5.1 SPECIAL EXTERNAL COMPONENTS

DKV651 0-71

Connection to Ground
plane or exlernal Ground

Conneclion 10 Vee
plane or exlernal Vee

Analog Area
do not route
TIL Logic
signals Ihrough
Ihls area.

4

1\

Analog :e: :o-n:1

~O~I:

- - - - - - - •

TIL Logic signals Ihrough
Ihls area.
TL/F/l03B4-10

This drawing was done with convenience in mind.

FIGURE 5-1. Recommended Layout

2-13

•

....
('I)

~

CD
~

5.0 Detailed Information

(Continued)

5.3 INPUT AND OUTPUT SCHEMATICS

SD±
-

DATA±,LBD±

,---....--ovcc

.....- - . - -.....- - - D VCC

DGND
DGND

-=

TlIF/l0S84-12

Tl/F/l0S84-11

DIFAMP

OSCFLTR

osc
FLTR
TLlF/l0S84-1S

Tl/F/l0384-14

VCOFLTR

OSCIN,OSCOUT

. . . - - - - -....- - - D VCC

p---veo
FLTR

DGND
TL/F/l0S84-15

TlIF/l0S84-16

2-14

5.0 Detailed Information

(Continued)

5.3 INPUT AND OUTPUT SCHEMATICS (Continued)

CRDEN,ElB
DVcc -

TEST EN

....- - -....- - - -

DVcc

DGND _
TL/F/103B4-17

DGND
TL/F/10384-1B

RXC±,RXD±

ClK DET, TTlSD

EXTVCC

DVcc

RXC+. RXC-.
RXD+, RXD-

CLK DET,
TTLSD

TLlF/103B4-19

DGND
TL/F/103B4-20

Typical ESD Structure

TLlF/103B4-21

2-15

_ r------------------------------------------------------------------------------

C")

~

D-

C

5.0 Detailed Information

(Continued)

5.4 DEBUG PROCEDURE

from the nominal value dependent on temperature and data
rate frequency error. If this pin is oscillating then the OSC
FLTR pins are unstable and the filters should be examined
for possible PC board shorts, opens or instability. If the OIF
AMP pin is near ground then check to see if the ELB input is
selecting the correct data input. If the OIF AMP pin continues to be near ground or Vee, then the accuracy of the 62.5
MHz source should be examined to verify it is within the ± 3
KHz (50 PPM) FOOl system data rate specification.

Evaluation of the OP83231 should begin by tying the CRO
EN and TEST EN pins low and confirming that the SO ±
pins are above 2V. This will disable the differential phase
comparator allowing the crystal resonator to run at its center
frequency and will keep the part out of a test mode. The first
PLL (see Figure 5-2) should be evaluated. The variable capacitor in the crystal resonator circuitry should be tuned so
that the crystal resonator oscillates at 10.41666 MHz. If the
oscillator circuit fails to oscillate the voltage levels of the
OSC IN and OSC OUT pins should be examined. The DC
voltage on these pins should be equal to approximately
Vee + 2 (with or without the crystal present). The capacitors which form the oscillator tank circuit should be returned
to the isolated ground branch in close proximity. After
checking the crystal frequency, examine the RXC ± output
and verify that this frequency is twelve times the crystal frequency. If this is not true then the VCO FLTR output should
be examined for possible PC board shorts, opens or filter
instability. The VCO FLTR pin should be stable at approximately a 1.5V DC level in operation.

OSC OSC
In Out

If the VCO FLTR pin is oscillating then the loop filter components for this pin were either chosen inappropriately or were
placed in the incorrect position.
Once it is known that the first PLL is working, force CRO EN
high and input a constant 62.5 MHz ± 50 ppm (1T pattern)
data stream to the OATA± inputs (see Agure 5-3). To see
how well the second loop is working examine the OIF AMP
pin. If the incoming data rate is exactly 62.5 MHz and the
crystal resonator was accurately adjusted as described
above, then the OIF AMP pin voltage should be stable at
approximately 2.25V. The voltage at this pin will vary

FLTR

Test
EN
TUF/l03B4-22

FIGURE 5-2. 1st PLL

CRD
EN
Data

VCO

RXC:t _ _...;:a,...

OSC

FLTR

+

Dill
Amp

:t
Sync

LBO :t

and

Delay Line

ELB--.....I

1-_ _ _...

RXD :t -~;.J....- - - - I
Slmpllfled
R~:t_~~+---------~--------------------i

1st PLL

(VCO)
TUF/l03B4-23

FIGURE 5·3. 2nd PLL

2-16

r----------------------------------------------------------------------.c
5.0 Detailed Information

"'U

~

(Continued)

N

....

5.5 AC TEST CIRCUITS

(0)

5V

-.1.0 kll

TLlF/l03B4-25

FIGURE 5·5. Switching Test Circuit
for All ECl Input and Output Signals
TLlF/l03B4-24

FIGURE 5·4. Switching Test Circuit
for All TTL Output Signals

fII

2·17

~National

~ Semiconductor

DP83241 CDDTM Device
(FDDI Clock Distribution Device)
General Description

Features

The COD device is a clock generation and distribution device intended for use in FOOl (Fiber Distributed Data Interface) networks. The device provides the complete set of
clocks required to convert byte wide data to serial format for
fiber medium transmission and to move byte wide data between the PLAYERTM and BMACTM devices in various station configurations. 12.5 MHz and 125 MHz differential ECl
clocks are generated for the conversion of data to serial
format and 12.5 MHz and 25 MHz TTL clocks are generated
for the byte wide data transfers.

• Provides 12.5 MHz and 25 MHz TTL clocks
• 12.5 MHz and 125 MHz ECl clocks
• 5 phase TTL local byte clocks eliminate clock
skew problems in concentrators
• Intemal VCO requires no varactors. coils or
adjustments
• Option for use of High Q external VCO
• 125 MHz clock generated from a 12.5 MHz crystal
• External Pll synchronizing reference for
concentrator configurations
• 28-pin PlCC package
• BiCMOS processing
TO HOST SYSTEM

DP83231
CRD
(CLOCK
RECOVERy)

~
TO FIBER OPTIC
TRANSCEIVER PAIR

FIGURE 1-1. FOOl Chip Set Block Diagram

2-18

TLlF/10385-1

~--------------------------------------------------~c

Table of Contents
1.0 FOOl CHIP SET OVERVIEW

5.0 DETAILED INFORMATION

~

Co)

~

....

5.1 External Components

2.0 FUNCTIONAL DESCRIPTION

5.2 Concentrator and Dual Attach Station Configurations

3.0 PIN DESCRIPTIONS

5.3 Layout Recommendations

4.0 ELECTRICAL CHARACTERISTICS

5.4 Input and Output Schematics

4.1 Absolute Maximum Ratings

5.5 System Debugging Flowchart

4.2 Recommended Operating Conditions

5.6 AC Test Circuits

4.3 DC Electrical Characteristics
4.4 AC Electrical Characteristics

•
2·19

_

"1:1'

N

CO)

co

a.
C

r---------------------------------------------------------------------~

DP83261 BMACTM Device
Media Access Controller

1.0 FDDI Chip Set Overview
National Semiconductor's FDDI chip set consists of five
components as shown in Figure 1-1. For more information
about the other devices in the chip set, consult the appropriate data sheets and application notes.

The BMAC device implements the Timed Token Media Access Control protocol defined by the ANSI FDDI X3T9.5
MAC Standard.

DP83231 CRDTM Device
Clock Recovery Device

Features
• All of the standard defined ring service options
• Full duplex operation with through parity
• Supports all FOOl Ring Scheduling Classes (Synchronous, Asynchronous, etc.)

The Clock Recovery Device extracts a 125 MHz clock from
the incoming bit stream.

Features

• Supports Individual, Group, Short, Long, and External
Addressing

• PHY Layer loopback test
• Crystal controlled
• Clock locks in less than 85

• Generates Beacon, Claim, and Void frames internally

'""S

• Extensive ring and station statistics gathering

DP83241 CDDTM Device
Clock Distribution Device

• Extensions for MAC level bridging
• Separate management port that is used to configure and
control operation

From a 12.5 MHz reference, the Clock Distribution Device
synthesizes the 125 MHz, 25 MHz and 12.5 MHz clocks
required by the BSI, BMAC, and PLAYER devices.

• Multi-frame streaming interface

DP83265 BSITM Device
System Interface

DP83251/55 PLAYERTM Device
Physical Layer Controller

The BSI Device implements an interface between the National FDDI BMAC device and a host system.

The PLAYER device implements the Physical Layer (PHY)
protocol as defined by the ANSI FDDI PHY X3T9.5 Standard.

Features
• 32-bit wide Address/Data path with byte parity
• Programmable transfer burst sizes of 4 or 8 32-bit words
• Interfaces to low-cost DRAMs or directly to system bus

Features
• 4B/5B encoders and decoders

• Provides 2 Output and 3 Input Channels

• Framing logic
• Elasticity Buffer, Repeat Filter, and Smoother

• Supports Headerllnfo splitting
• Efficient data structures

• Line state detector/generator

• Programmable Big or Little Endian alignment
• Full Duplex data path allows transmission to self
• Comfirmation status batching services

• Link error detector
• Configuration switch
• Full duplex operation
• Separate management port that is used to configure and
control operation.

• Receive frame filtering services
• Operates from 12.5 MHz to 25 MHz synchronously with
host system

In addition, the DP83255 contains an additional
PHY_Data. request and PHY_Data.indicate port required
for concentration and dual attach stations.

2-20

2.0 Functional Description
The CDD device clocks are all generated from and phase
aligned to either a 12.5 MHz crystal oscillator or a TTL input
reference source using digital phase locked loop techniques. The architecture of the Clock Distribution Device ensures that the output clocks which are generated have frequency tolerances identical to the 50 PPM crystal reference.
When the reference input signal is a backplane signal, the
matching of the phase comparator input path delays guarantees phase alignment within 3 ns.
The phase locked loop generates the desired clocks as
shown in the device Block Diagram. One of the local By1e
Clock (lBC) phases is connected to the FEEDBK IN input of
the phase comparator where its phase and frequency are
compared against that of the selected input reference signal. Any phase error between these signals results in a correction of the voltage into the Voltage Controlled Oscillator
(VCO) which is proportional to the amount of phase error.
The correction voltage tends to drive the frequency of the
VCO in the direction which, when divided down, minimizes
the lBC to reference signal phase difference. When the
phase transition of the lBC occurs before that of the reference input the VCO frequency is sensed as being too fast
and produces a negative going correction to the VCO input.
This in turn slows down the VCO's frequency and delays the
subsequent lBC phase transitions.
The device's differential 125 MHz ECl transmit clock and
differential 12.5 MHz ECl load strobe are used by the
PLAYER device to convert data from by1e wide NRZ format
to serial NRZi format for fiber medium transmission. A
12.5 MHz TTL local by1e clock is provided for use by the
PLAYER and the BMAC devices. Five phases of the local
by1e clock are provided for use in large multi-board concentrator configurations to aid in cancelling out backplane delays. A 25 MHz local Symbol Clock (lSC) is provided which
is in phase with the local by1e clocks and has a 40% HIGH
and 60% lOW duty cycle.

mon reference signal. The VCO SEl input provides the option to use the internally provided VCO or an external lC
voltage controlled oscillator. Although the stability of the internal VCO should be adequate for most applications the
external VCO option provides the means of obtaining the
maximum possible oscillator Q. The PHASE SEl input pin
provides the option of selecting whether the five phase lBC
outputs are phase offset 36 degrees or 72 degrees (8 ns or
16 ns).
The phase locked loop (Pll) elements, with the exception
of the loop filter which consist of two capacitors and a resistor, are fully contained within the device. The internal VCO
associated with the Pll has been implemented totally within the device and requires no external lC oscillator tank
coils, capacitors, or varactors. The external VCO option
does provide a means of using these conventional lC oscillator techniques if desired.

Connection Diagram
28-Pin PlCC Package

REFIN

5

LBCI

XTLOUT

LBC2

NC

LBC3
DPB3241B

XTtIN
REFSEL

LBC4
LBC5

FILTER

10

LSC

VCORST

11

PHASESEL

TLlF/l0385-25

The device provides three user-selectable features. The
REF SEl input provides the option to lock the device's outputs to a crystal oscillator or to an external TTL signal (REF
IN). The REF IN signal is particularly useful in concentrators
where multiple boards need to be phase locked to a com-

Order Number DP83241BV
See NS Package Number V28A
FIGURE 2-1. DP83241 Pinout

Block Diagram
XTL IN

XTL OUT

REF SEL

INT
Vee

EXT
Vee

INT
GND

EXT
GND

SUB
GND

...L...L...L...L...L
- - -

- - -

REF IN

FILTER

FEEDBK IN
VCO RST
PHASE SEL

II

LSC
XVCO IN
XVCO INB
veo SEL

LBC5

LBC4

LBC5

LBC2

LOCI TBC TBC TXC TXC

+ -

+ -

FIGURE 2-2. DP83241 Block Diagram
2-21

TLlF/l0385-3

3.0 Pin Descriptions
Symbol

Pin
No.

Desc'riptlon

110

DVee

16

Digital Vee: Positive power supply for all the internal circuitry intended for operation at 5V ± 5% relative
to GND. A bypass capacitor should be placed as close as possible across the DVee and DGND pins.

EXTVcc

28

External Vee: Positive power supply for all the output buffers intended for operation at 5V ± 5% relative
to GND. A bypass capacitor should be placed as close as possible across the EXTVee and EXTGND
pins.

DGND

15

Digital Ground: Internal circuit power supply return.

EXTGND

1

External Ground: Output buffer power supply return.

AGND

14

Analog Ground: Substrate ground used to ensure proper device biasing and isolation.

AVee

18

Analog Vee: Positive power supply for the critical analog circuitry, intended for + 5V operation ± 5%
relative to Ground. A bypass cap should be placed as close as possible between AVee and AGND.

XTLIN

B

XTLOUT

6

REF IN

I

External Crystal Oscillator Input: XTL IN can also be used as a CMOS compatible reference frequency
input for the PLL. This input is selected when REF SEL is at a logical LOW level. The component
connections required for oscillator operation are shown in the application diagrams.

5

I

Reference Input: TTL compatible input for use as the PLL's phase comparator reference frequency
input when the REF SEL is at a logic HI level. This input is for use in concentrator configurations where
there are multiple CDD devices at a given site requiring synchronization.

FEEDBKIN

4

I

Feedback Input: TTL compatible input for use as the PLL's phase comparator feedback input to close
the loop. This input is intended to be driven from one of the LBCs (Local Byte Clocks). This input is
designed to provide the same frequency and within 2 ns of the same phase as REF IN when REF IN is in
active operation.

REFSEL

9

I

Reference Select: TTL compatible input which selects either the crystal oscillator inputs XTL IN and
XTL OUT or the REF IN inputs as the reference frequency inputs for the PLL. The crystal oscillator inputs
are selected when REF SEL is at a logic LOW level and the REF IN input is selected as the reference
frequency when REF SEL is at a logic HI level.

FILTER

10

a

Filter: Low pass PLL loop filter pin. A three element filter, consisting of one capacitor in parallel with a
resistor and another capacitor, should be connected between this pin and ground.

VCOSEL

17

I

VCO Select: TTL compatible input used to select either the internal VCO or an external VCO through the
XVCO IN and XVCO INB pins. The internal VCO is selected when the VCO SEL pin is at a logic HIGH
level and the external veo is selected when at a logic LOW level.

XVCOIN,
XVCOINB

13,
12

I

External VCO Inputs: Differential inputs for use with an external VCO. These inputs are D.C. biased to
approximately one half Vee, and can be connected to either a full differential VCO, or a single-ended
VCO. To use a Single-ended VCO, couple the signal into one of the inputs through a series low value
capacitor and bypass the other input to GND through a 0.01 p.F capacitor. When not in use, ground one
input, and let the other float.

External Crystal Oscillator Output: XTL OUT is not intended for use as a logic drive output pin.

2-22

3.0 Pin Descriptions (Continued)
Pin
No.

110

VCORST

11

I

VCO Reset: TTL compatible input used to reset the internal VCO on system power up. This input
stops the VCO from oscillating when at a logic HI level thereby reinitializing each of the gates in
the ring oscillator.

TXC+.
TXC-

3.
2

a

Transmit Clock: lOOK ECL compatible differential outputs for use at 125 MHz as the fiber
medium Transmit Clock (TXC) source for the PLAYER device.

TBC+,
TBC-

27,
26

a

Transmit Byte Clock: lOOK ECL compatible differential outputs for use at 12.5 MHz as a load
strobe or transmit byte clock by the PLAYER device to convert byte wide data to serial format for
fiber medium transmission. These outputs are positioned to transition on the falling edge of the
TXC + clock output to provide the maximum setup and hold margin. They are also phase
coherent with the TTL LBCl output, but the phase transition occurs approximately IOns earlier.

25,24,
23,22,21

a

Local Byte Clocks: TTL compatible local byte clock outputs which are phase locked to crystal
oscillator reference signals. These outputs have a 50% duty cycle waveform at 12.5 MHz. The
PHASE SEL input determines whether the five phase outputs are phase offset by 8 ns or 16 ns.

LSC

20

a

Local Symbol Clock: TTL compatible 25 MHz output for driving the BMAC device. This output's
negative phase transition is aligned with the LBCl output transitions and has a 40% HI and 60%
LOW duty cycle.

PHASESEL

19

I

Phase Select: TTL compatible input used to select either a 8 ns or 16 ns phase offset between
the 5 local byte clocks. The LBC's are phase offset 8 ns apart when PHASE SEL is at a logic LOW
level and 16 ns apart when at a logic HI level.

Symbol

LBCl thru 5

Description

fII

2-23

4.0 Electrical Characteristics
4.1 ABSOLUTE MAXIMUM RATINGS
If Military/Aerospace specified devices are required,
please contact the National Semiconductor Sales
Office/Distributors for availability and specifications.
- 65·C to + 150·C
Storage Temperature
TIL Signals
Inputs
-0.5Vto +5.5V
Outputs
-0.5Vto +5.5V

ECL Signals
Output Current
Supplies
EXTVee to EXTGND
DVeetoDGND
AVeeto AGND
ESD Protection

-50mA
-0.5Vto +7V
-0.5Vto +7V
-0.5Vto +7V
1500V

4.2 RECOMMENDED OPERATING CONDITIONS
Symbol

Min

Typ

Max

Units

4.75

5.0

5.25

V

Parameter

VeetoGND

Power Supply

VIH

High Level Input Voltage
Low Level Input Voltage

Vil

TTL

2.0

ECL

Vee - 1.165

Vee - 0.880

Vee - 1.810

Vee -1.475

V

TTL

0.8

ECl

V

IOH

High level
Output Current

TTL Outputs
(Note 1)

-0.4

mA

IOl

low level
Output Current

TTL Outputs
(Note 1)

8.0

mA

Fveo

VCO Frequency (lNT or EXT)

250

FREF

Reference Input Frequency

12.5

Operating Temperature
TA
Note 1: TTL outputs Include lBC1, lBC2, lBC3, lBC4, lBe5 and lSC.

0

25

MHz
MHz
70

·C

Max

Units

-1.5

V

4.3 DC ELECTRICAL CHARACTERISTICS
Symbol

Parameter

Conditions

Min

= 18mA

Vie

Input Clamp Voltage

liN

VOH

High level
Output Voltage

TTL Outputs: IOH

= -400/LA

EClOutputs:
50n load to Vee - 2V

V

Vee - 2
Vee -1025

= 8 mA

Vee - 880

mV

0.5

V

Vee - 1620

mV

100

/LA
/LA

low level
Output Voltage

TTL Outputs: IOl

II

Max High level
Input Current

TTL Inputs: VIN

= 7V

IIH

High level
Input Current

TTL Inputs: VIN

= 2.7V

-20

20

III

low level
Input Current

TTL Inputs: VIN

= 0.4V

-20

20

/LA

IFilter

Charge Pump Current

Source

-0.7

+0.7

mA

0.2

0.7

mA

-250

250

nA

VOL

EClOutputs:
50n load to Vee - 2V

Sink
TRI·STATEIID

Vee - 1810

mA
Supply Current
170'
lee
'Includes 60 mA due to external ECl termination of two differential signals.
For tOOk ECl output buffers, output levels are specified as:
VOH-Max ~ Vee - O.BBV
VOL~ax ~ Vee - 1.62V
Since the outputs are differential, the average output level is Vee - 1.25V. The test load per output is son at Vee - 2V. The extemalload current through this
500. resistor is thus:

I_load

[(Vee - 1.25) - (Vee - 2)]/50 Amps
0.015 Amps
~ 15mA
There are 2 pairs of differential ECl Signals, so the total ECl current is 60 mAo
~

~

2·24

C

"U

4.0 Electrical Characteristics (Continued)

co
Co)

N

4.4 AC ELECTRICAL CHARACTERISTICS
Symbol

Parameter

Tl

TBCtoTXC

T2

TBCto LBCl

TPhase1

LBCl toLBC2

TPhase2

Conditions

LBCl toLBC4

TPhase4

LBCl to LBC5

Max

Units

-1.5

1.5

ns

10

20

ns

PHASE SEL = Low

3

13

ns

PHASE SEL = High

43

53

ns
ns

(Note 1)

LBCl to LBC3

TPhase3

Min

PHASE SEL = Low

11

21

PHASE SEL = High

11

21

ns

PHASE SEL = Low

19

29

ns

PHASE SEL = High

59

69

ns

PHASE SEL = Low

27

37

ns

PHASE SEL = High

27

37

ns

T3

LSCtoLBCl

-4

6

ns

T4

LSC Positive Pulse Width

12

19

ns

T5

REF IN to FEEDBK IN

In Lock (Note 1)

-3

3

ns

T6

TXC Positive Pulse Width

(Note 1)

3.5

4.5

ns

T7

LBC Positive Pulse Width

35

45

ns

.....
""'"

Note 1: These parameters are not tested, but are assured by correlation with characterization data.

r4~r;;;;.,-...

TXC

.....T6

... ~~

TBC 50"

• ••

I-T2

LBCl

--~~,

1.5V-'!\
'--~---

~

,r------

.....
1.5V..., ....

....

LBC2-5

50"2
T

... - - - - - - '

..... Tphasel-4

i-

Tphasel-4 ...

-'\"1.5V

~C ,,,~ D-~ .'\o~-~-V---··· -l--r-4-+.-·. .

1.5V7~

T3- . 1

REf IN

FEEDBK IN

,,,{~

f
TL/F/l038S-4

FIGURE 4-1. AC Timing Waveforms

2-25

fII

_ r----------------------------------------------------------------------,

'OS'

C'I)

4.0 Electrical Characteristics (Continued)

a.

4.4 AC ELECTRICAL CHARACTERISTICS (Continued)

N

co

Q

TXC

TBC

j

LBC1

J

LBC2

~

I

LBC3

-_

.......

PHASE SEL
IS LOW

LBC4 ...;._ _ _~

L

LBCS ......_ _ _ _~

LSC

LBC1

J

LBC3

-+-_.......

L

LBCS _ _ _ _ _.....

PHASE SEL
IS HIGH

I

LBC2 -;--,..._ _ _ _ _...

'--__

LBC4

~I
TLlF/10385-5

FIGURE 4-2. Typical Clock Relationships

2-26

Loop Filter Calculations
Let us now design an example system with the following
characteristics:

Several constants need to be known in order to determine
the loop filter components. They are the loop divide ratio, N,
the phase detector gain, Kp, the vce gain, Ko, the loop
bandwidth, Wo, and the phase margin, cp. The constants Kp
and Ko for the DP83241 are fixed at 80 ",Alrad and 0.8
GradlV respectively. N is equal to the vce frequency divided by the reference frequency. Wo is recommended to be
less than 1/20th of the reference frequency (times 21T
rads). Having found all these constants, the following equations are used to find the component values:
For cp = 57' phase margin:

• 12.5 MHz Crystal reference.
• 250 MHz vce.
Since the vce is twenty times the frequency of the reference frequency, we get N = 20. We will set Wo to be 1/30th
of the reference frequency or 2.62 x 106 Rad.
From these values we get:
Cl = 1400 pF, C2 = 140 pF, and Rl = 9000.
Let us now design an example system with the following
characteristics:

Rl = (1.1 N wo)/(Kp Ko)
Cl = (3 Kp Ko)/(N wo2)
C2 = (0.3 Kp Ko(l(N wo2)
For a phase margin other than 57':
Rl = (Cosec cp + 1)((N wo/2 Kp Ko))
Cl = (Tan cp) ((2 Kp Ko)/(N wo2))
C2 = (Sec cp - Tan cp) ((Kp Ko/(N wo2))

• 12.5 MHz Crystal reference.
• 250 MHz External vee with a gain of 40 MRadlV.
We will set Wo to be 1/78th of the reference frequency or
1.0 x 106 Rad.
From these values we get:
Cl = 470 pF, C2 = 47 pF, and Rl = 6.8 kn.
FILTER PIN

The component equations above are not meant to provide
optimal solutions for all implementations.

::0
TL/F/l0365-27

2-27

.....
..,.
~

CD
~

5.0 Detailed Information
5.1 EXTERNAL COMPONENTS

.-_-----+--.

DGNO

9104
+5V
1000pr

veo
RST

LSC

R=I.6Zo

R= 1.6 Zo

R=2.6Zo

R=2.6Zo

TXC~

+5V
PHASE SEL
veo SEL

-

DP83241

+5V

REr SEL

GNO

EXT

LBC2-

GNO

LaC5

LBCI

FE£OBK
IN

R= 1.6Zo

R=I.6Zo

R=2.6Z0

R=2.6Zo

TBC~

-

Zo Is the line Impedance

TLIFII0385-6

The Filter components are based on a 12.5 MHz Crystal and a 250 MHz VCO.
All component values ± I 0%.

FIGURE 5·1. General Wiring Diagram

6.8K
470pr
+5V

DGNO

24pr

+5V

47pr
5104
tOKQ

+5V

i--L----.J=~~:1.----.!.--.l---.,
XTL OUT
XTL IN
LSC

R= 1.6Zo
R= 1.6Zo

R=2.6Zo

R=2.6Zo

+5V

R= t.6Zo

R=I.6Zo

R=2.6Zo

R=2.6Zo

Zo Is the lint Impedance

The Filter components are based on a 12.5 MHz Crystal and an external 250 MHz VCO with a gain of 40 MRadlV.
All component values ±10%.

FIGURE 5·2. General Wiring Diagram with an External VCO

2·28

TLlF110385-7

r-----------------------------------------------------------~c

"'U
CD

5.0 Detailed Information (Continued)

Co)
I\)

0l:Io
.....

TABLE 5·1. Special External Components
Crystal Resonator:

Part #:
Manufacturer:
Key Specifications:

C5410N
NEL
12.5000 MHz Center Frequency,
20 PPM Accuracy, O·C to + 70·C
15 pF Load Capacitance

Varactor Diode:

Part#:
Manufacturer:
Key Specifications:

MV21 05
Motorola
Cap Tolerance ± 10%

VHF NPN Transistor:

Part#:
Manufacturer:
Key Specifications:

PN3563
National Semiconductor

Inductor.

Part#:
Manufacturer:
Key Specifications:

5.2 CONCENTRATOR AND DUAL ATTACH STATION
CONFIGURATIONS

period and the skew between the COD devices on the two
boards is minimal. In a larger concentrator configuration
where this skew becomes too large, the data setup time of
the downstream station will be directly impacted. One way
to avoid this problem is to latch data into the next station.
The strobe for the latch will be supplied by one of the LBC
outputs from the upstream station's CDO device. An LBC
output phase is chosen that occurs after the physical layer
data is stable. Assuming that the data and LBC flight times
are equal, the LBC output will latch data for the next station.
The LBC output phase should be selected to give the optimum setup and hold time for the receiving station's physical
layer function.

5.2.1 Concentrator Applications
An application where many of the features of the COD de·
vice are used is a FOOl concentrator. A concentrator is
used to connect several workstations and peripherals to a
Single node in the network. A concentrator provides the ability to easily bypass or insert multiple stations into the network. The COO device in each station is driven from a common oscillator instead of each COD device being driven by
its own crystal. In a small concentrator, the same LBC
phase can be used in each station since the data flight time
from one board to another is small compared to the LBC

--

--- -

- - -- -- - -

~7 ~~

1

PHY

1% Turns

~7 J.~

J

I

PHY

I

COO

~~

I

.-- - - -I
I
I
I

~7

1

J.),

PHY

J

jlOCI
lOCI

1

COD

J+-

1+

I OscillatorJ -

lOCI

1

coo

---.. ;;:st~;-----TLlF/l0385-8

FIGURE 5-3. Small Concentrator Application

fII

2-29

5.0 Detailed Information (Continued)

LBC1

----------------Master

----------------_.
Board 1

-----------Board N
TLlF/l03B5-9

FIGURE 5-4. Large Concentrator Application

Board 1
LBCI
(BOARD I)
DATA OUT
Board N
DATA IN

-t=\

~
* Th~
i,

LBC3
(BOARD I)

I

\

\
>®C

I

LATCH OUT
i----Td---i

LBCI
(BOARD N)
TLlF/l03B5-10

T. =
Tb =
Tc =
Td =

Time to latch data out of the Physical Layer (Board 1)
Data flight time
Latch delay
Ideal setup time for incoming data
= Tdl + Td2 + Td3
Tdl = Reference error between COD devices
Td2 = Minimum phase resolution of COD device = 8 ns
Td3 = Setup time

FIGURE 5-5. Large Concentrator Timing

2-30

c

5.0 Detailed Information

"co

(Continued)

c.,)

needed at the CDD device for this method of routing the
ECL signals. The value of this resistor can be calculated
from the following equation:

5.2.2 CDD Device Driving Multiple PLAYER Devices
In a FDDI concentrator or dual attach station, it may be
necessary for a single DP83241 Clock Distribution Device
(CDD device) to drive multiple DP83251 155 PLAYER devic·
es. Since these PLAYER devices will be running synchro·
nously to each other they must have the same clocks. The
easiest way to accomplish this is to have one CDD device
drive multiple PLAYER devices.

R (Max) = 10Zo - RS

e

n

Where:
Re (Max) -

We are only concerned with the ECL outputs being able to
drive multiple loads. The conventional way of directly wiring
the one output to many inputs will not work. If the ECL signals are split into multiple traces then reflections will result
which may ruin the signal's integrity. An appropriate method,
where individual traces with a series resistor connected to
each load, is used instead. The series resistor should match
the line impedance and be placed as close to the CDD device as possible. The resistor will act as a voltage divider
and cut the voltage level of the signal in half. When this
modified signal reaches the input of the unterminated gate,
reflections will cause the signal to double and the receiving
input will see the full voltage swing. The reflection will then
travel back towards the CDD device, but the series resistance will stop this action. An emitter pulldown resistor is

n-

Largest emitter pulldown resistor
that can be used
Number of parallel lines being driven

Zo - Trace impedance
RS -

Series damping resistor

Another method for sending the ECL signal to multiple players is to route the ECL signal as a bus line and have each
load connected to the bus. The ECL bus line must be terminated only at the very end with a matching impedance (e.g.:
a 50.0. line will be terminated with a 50.0. load to Vee - 2V).
It is preferred that the input pin be directly connected to the
bus and not have a signal tap connected to the bus. However, if a tap off the bus is necessary, the shortest possible tap
is recommended.

DP83251

DP83251
Rs

TXC+ 1-1>---'111/\,----/

DP83241
DP83251

R.

DP83251
TLlF/10385-12

FIGURE 5-7. CDD Device Driving Four PLAYER Devices in Parallel

2-31

N

....
~

,..
..,.
N

C')

co

Il.

C

,-------------------------------------------------------------------------------------,
5.0 Detailed Information (Continued)
As with any high speed Signal, the routing of the Signal must
be carefully done. Sharp corners and other changes in trace
impedance should be avoided to reduce reflections in high
speed signal traces. Traces longer then one inch should
have a series or parallel termination scheme. Further system considerations can be found in National's F100K Design Guide. If these methods are followed the DP83241 signals will be able to drive multiple DP83251/55 PLAYER devices without any problems.

The most conservative method for routing the ECl signals
to multiple loads is to use the F100115 Quad low Skew
Driver. This device takes a differential ECl signal and outputs four of the same differential signals with a skew between them of less than 75 ps. Two of these devices will
allow the CDD device to drive four PLAYER devices. This
setup allows the ECl signals to be routed in a point to point
configuration to each PLAYER device.

~

DP83241

I.SZo

TXC+

Zo

1
DP83251

1

1

DP83251

DP83251

2.6Zo

-==
TL/F/lD385-13

FIGURE 5·8. Proper Bus Line Termination and Connections

DP83251
TOC+
nec+

DP83251
TSe-

nec+

nee-

necTSC+

TOC

nec+

F100115
nee-

DP83241
TOC+

F100115
TSCnec+

I

nec-

TSC+

DP83251

TSC-

nec+

TSC+

TOC

nec-

DP83251
TL/F/l0385-14

o Parallel Terminalion

FIGURE 5·9. CDD Device Driving Four PLAYER Devices Using Two F100115 Quad Low Skew Drivers

2-32

5.0 Detailed Information

(Continued)

5.3 LAYOUT RECOMMENDATIONS

• The external crystal circuitry should be connected to
Ground on an isolated branch off of the DGND pin .

• The part should be bypassed between the EXTVee and
EXTGND as close to the chip as possible (preferably under the chip using chip caps). The part should also be
bypassed between the DVee and DGND as close to the
chip as possible.

• The DGND pin should be connected to Ground off of an
isolated branch of the EXTGND pin, connected through a
ferrite bead or small inductor.
• The AGND pin should be connected to Ground off of an
isolated branch of the DGND pin, connected through a
ferrite bead or small inductor.

• The part should be bypassed between AVec and AGND
as close to the chip as possible.
• No TTL logic lines should pass through the external crystal or filter circuitry areas to avoid the possibility of noise
due to crosstalk.

• If the part is being driven by an external reference, the
XTL IN pin should be tied to either GND or Vee.
• If using a multilayered board with dedicated Vee and
Ground planes, ensure that the external crystal circuitry
has its own small isolated ground island that is connected to the AGND, DGND and EXTGND pins as described
above.

• The filter circuitry should be connected to Ground on an
isolated branch off of the AGND pin.
• The DVcc pin should be connected to Vee on an isolated branch off of the EXTVee pin, preferably being connected through a ferrite bead or small inductor.

• See Figure 5. 1 for component values.
• For best performance tie the VCORST pin to AGND.

• The AVec pin should be connected to Vee on an isolated branch off of the DVee pin, preferably being connected through a ferrite bead or small inductor.

GND

Vee

25
24

External
Crystal
Circuitry

23
22

21

~"""
~
~
~ • ______ _ Iio!io."".....

20

~

~'\~"''''''''''''''''~~i.: )(~~
~ L" ~",~A:
I""'''''
:·:i~,

This area should not have any other :
TTL signals passing through it. --+

Filter Circuitry

This drawing was done with convenience in mind.
Note: Pin 7 need nol be hooked up.

TLIFI1038S-IS

FIGURE 5-10. Recommended Layout

•
2-33

5.0 Detailed Information (Continued)
5.4 INPUT AND OUTPUT SCHEMATICS
XTL IN, XTL OUT

XVCO IN, XVCO INB
...-_ _-DVec

DVec
+2

_
DGND

EXTGND

-=-

TL/F/1038S-17

, TLlF/1D38S-16

Filter

TTL Outputs: LBC1-LBC5, Symbol Clock

. - - - - -.....---DVee

EXTVCC -

.....- -.....- - - - - - - - ,
2611

p. ••• TTL
OUTPUTS:
(LBC1-L8CS,
Symbol Clock)

FlLTtR

EXTGNO
TL/F/1038S-18

CMOS Inputs: REF IN, FEEDBK IN, PHASE SEL,
VCO RST, VCO SEL

TLlF/1038S-19

Typical ESD
Structure

r----.....-ovcc

TXC+, TXC-, TBC+, TBCEXTVec

TXC+, TXC-,
TBC+, TBC-

TL/F/1038S-21

EXTGND
TLlF/1038S-22

TL/F/1038S-20

2-34

5.0 Detailed Information

(Continued)

5.5 SYSTEM DEBUGGING FLOWCHART

Check to make sure
that the VCO RST Is
at a logic lOW and
that the VCO SEl Is

No

set to the correct
VCO (EXT or INT).

The loop filter Is
unstabla and should
be examlnad.

Check MOD SEl and
make sure tho VCO
Is set for the
correct VCO Range.

Make sure that ana
of tho lBC outputs
Is connected to the
fEEDBK IN pin.

Ves

Maka sure that the
REf SEl Input Is
selecting the correct
raferenca Input and
check to make sure
tho referanca Input
Is at the correct
frequency.

Tho Part should be
In lock. If using an
axtemal VCO, adjust
tho circuitry to give
a nominal value of
2.0 Volts on the
filTER pin.

Ves

TL/F/l03B5-23
Note 1: If the crystal oscillator is chosen as the input reference source then the XTl OUT pin should be checked for the correct frequency of oscillation. If the
oscillator fails to oscillate then the DC voltage on these pins should be checked and be equal to approximately Vee" 2 (with or without the crystal oscillator
present).

5.6 AC TEST CIRCUITS
SV

1.3kn
Tl/F/l03B5-26

FIGURE 5·12. Switching Test Circuit
for All ECl Output Signals
TUF/l03B5-24

fII

FIGURE 5·11. Switching Test Circuit
for All TTL Output Signals

2-35

it)
it)

C'I

~

a.

~National

~ Semiconductor
.....
.,...
C

it)

C'I

('I)

CD

a.
C

OP83251/55 PLAVERTMOevice
(FOOl Physical Layer Controller)
General Description

Features

The DP83251/DP83255 PLAYER device implements one
Physical Layer (PHY) entity as defined by the Fiber Distributed Data Interface (FDDI) ANSI X3T9.5 Standard. The PLAYER device contains NRZ/NRZI and 4B/5B encoders and
decoders, serializer/deserializer, framing logic, elasticity
buffer, line state detector/generator, link error detector, repeat filter, smoother, and configuration switch.

•
•
•
•
•
•
•
•
•

Low power CMOS-BIPOLAR process
Single 5V supply
Full duplex operation
. Separate management interface (Control Bus)
Parity on PHY-MAC Interface and Control Bus Interface
On-Chip configuration switch
Internal and external loopback
DP83251 for single attach stations
DP83255 for dual attach stations

TO HOST SYSTEM

DP83241
CDD
(CLOCK
DISTRIBUTION)

DP83231
CRD
(CLOCK
RECOVERY)

'----y--J
TO FIBER OPTIC
TRANSCEIVER PAIR

FIGURE 1-1. FOOl Chip Set Block Diagram

2-36

TL/F/10386-1

C

Table of Contents

"'D

(XI

w
I\)

.....

U1

7.0

ELECTRICAL CHARACTERISTICS
7.1 Absolute Maximum Ratings
7.2 Recommended Operating Conditions
7.3 DC Electrical Charcteristics
7.4 AC Electrical Charcteristics
7.5 Test Circuits
8.0 DETAILED DESCRIPTIONS
8.1 Framing Hold Rules
8.2 Noise Events
8.3 Link Errors
8.4 Repeat Filter
8.5 Smoother
8.6 National Byte-wide Code for PHY-MAC Interface

1.0
2.0

FOOl CHIP SET OVERVIEW
ARCHITECTURE DESCRIPTION
2.1
Overview
2.2 Interfaces
3.0 FUNCTIONAL DESCRIPTION
3.1 Receiver Block
3.2 Transmitter Block
3.3 Configuration Switch
4.0 MODES OF OPERATION
4.1 Run Mode
4.2 Stop Mode
4.3 Loopback Mode
4.4 Cascade Mode
5.0 REGISTERS
6.0 PIN DESCRIPTIONS
6.1 DP83251
6.2 DP83255

2-37

.......
C
"'D
(XI

W

I\)

U1
U1

~

~

N

C")

~

C
......
....
~

N

,---------------------------------------------------------------------------------,
1.0 FDDI Chip Set Overview
National Semiconductor's FOOl chip set consists of five
components as shown in Figure '1·1. For more information
on the other devices of the chip set, consult the appropriate
datasheets and application notes.
'

C")

co

Q.

C

DP83231 CRDTM Device'
Clock Recovery Device

DP83261 BMACTM Device
Media Access Controller

The Clock Recovery Device extracts a 125 MHz clock from
the incoming bit stream.

The BMAC device implements the Timed Token Media Ac·
cess Control protocol defined by the ANSI FDDI X3T9.5
MAC Standard.

Features

Features

• PHY Layer loopback test
• Crystal controlled
• Clock locks in less than 85 p.s

• All of the standard defined ring service options
• Full duplex operation with through parity
Supports all FDDI Ring Scheduling Classes (Synchro·
nous, Asynchronous, etc.)

DP83241 CDDTM Device
Clock Distribution Device

• Supports Individual, Group, Short, Long, and External
Addressing
• Generates Beacon, Claim, and Void frames internally
o Extensive ring and station statistic gathering

From a 12.5 MHz reference, the Clock Distribution Device
synthesizes the 125 MHz, 25 MHz, and 12.5 MHz clocks
required by the BSI, BMAC and PLAYER devices.

• Extensions for MAC level bridging
• Separate management port that is used to configure and
control their operation

DP83251/55 PLAYERTM Device
Physical Layer Controller

• Multi·frame streaming interface

The PLAYER device implements the Physical Layer (PHY)
protocol as defined by the ANSI FOOl PHY X3T9.5 Stan·
dard.

DP83265 BSITM Device
System Interface
The BSI device implements the interface between the
BMAC device and a host system.

Features
• 4B/5B encoders and decoders
• Framing logic
• Elasticity Buffer, Repeat Filter and Smoother

Features

• Line state detector/generator

• Programmable transfer burst sizes of 4 or 8 32·bit words
• Interfaces to low cost DRAMs or directly to system bus

• 32·bit wide Address/Data path with byte parity

•
•
•
•

Link error detector
Configuration switch
Full duplex operation
Separate management port that is used to configure and
control their operation
In addition, the DP83255 contains an additional
PHY_Data. request and PHY_Data.indicate port required
for concentrators and dual attach stations.

• Provides 2 Output and 3 Input Channels
• Supports Header/Info splitting
• Efficient data structures
• Programmable Big or Little Endian alignment
• Full duplex data path allows transmission to self
• Confirmation status batching services
• Receive frame filtering services
• Operates from 12.5 MHz to 25 MHz synchronously with
the host system

2·38

C

"'tI

2.0 Architecture Description

CD
Co)

• Generates Idle, Master, Halt, Quiet or other user defined
symbol pairs upon request.

2.1 OVERVIEW

The PLAYER device is comprised of four blocks: Receiver,
Transmitter, Configuration Switch and Control Bus Interface
as shown in Figure 2-1.
Receiver

During normal operation, the Receiver Block accepts serial
data as inputs at the rate of 125 Mbps from the Clock Recovery Device (DP83231). During the Internal Loopback
mode of operation, the Receiver Block accepts data from
the Transmitter Block as inputs.
The Receiver Block performs the following operations:
• Converts the incoming data stream from NRZI to NRZ, if
necessary

C

• Provides smoothing function when necessary.
During normal operation, the Transmitter Block presents serial data to the fiber optic transmitter. While in the External
Loopback mode, the Transmitter Block presents serial data
to the Clock Recovery Device.

N
CI1
CI1

• Program the Configuration Switch.
• Enable/disable functions within the Transmitter and Receiver Blocks (Le., NRZ/NRZI Encoder, Smoother, PHY
Request Data Parity, Line State Generation, Symbol Pair
Injection, NRZ/NRZI Decoder, Cascade Mode, etc.).
The Control Bus Interface also performs the following functions:
o Monitors Line States received

• Compensates for the differences between the upstream
and local clocks
• Decodes Line States
• Detects link errors
Finally, the Receiver Block presents data symbol pairs
(bytes) to the Configuration Switch Block

• Monitors link errors detected by the Receiver Block
• Monitors other error conditions
2.2 INTERFACES
The PLAYER device connects to external components via 5
functional interfaces: Serial Interface, PHY Port Interface,
Control Bus Interface, Clock Interface, and the Miscellaneous Interface.

Configuration Switch
An FDDI station may be in one of three configurations: Isolate, Wrap or Thru. The Configuration Switch supports these
configurations by switching the transmitted and received
data paths between the PLAYER and BMAC devices.
The configuration switching is performed internally, therefore no external logic is required for this function.

Serial Interface
The Serial Interface connects the PLAYER device to a fiber
optic transmitter (FOTX) and the Clock Recovery Device
(DP83231).

Transmitter

The Transmiter Block accepts 1O-bit bytes from the Configuration Switch.
The Transmitter Block performs the following operations:
• Encodes the data from 4B to 5B coding.
• Filters out code violations from the data stream.
TO BMAC OR PLAYER DEVICE

TO BMAC OR PLAYER DEVICE

PHY PORT INTERFACE
PHY REQUEST DATA

PHY PORT INTERFACE

PHY INDICATE DATA

PHY REQUEST DATA

V>

:::>

co

-'

o

................................~~o

<.>

e

SERIAL INTERFACE
PMD INDICATE DATA

SERIAL INTERFACE
PMD REQUEST DATA
TO FIBER OPTIC TRANSMITTER

FROM CRD DEVICE

TLlF/l0386-2

FIGURE 2-1. PLAYER Device Block Diagram

2-39

......

.......

• Converts the data stream from NRZ to NRZI format
ready for transmission, if necessary.

Control Bus Interface
The Control Bus Interface allows a user to:

• Decodes the data from 5B to 4B coding
• Converts the serial bit stream into 10-bit bytes

N
CI1

"'tI
CD
Co)

2.0 Architecture Description

3.0 Functional Description

(Continued)

The PLAYER Device is comprised of four blocks: Receiver,
Transmitter, Configuration Switch and Control Bus Interface.

PHY Port Interface
The PHY Port Interface connects the PLAYER device to
one or more BMAC devices and/or PLAYER devices. Each
PHY Port Interface consists of two byte-wide-interfaces,
one for PHY Request data input to the PLAYER device and
one for the PHY Indicate data output of the PLAYER device.
Each byte-wide interface consists of a parity bit (odd parity),
a control bit, and two 4-bit symbols.

3.1 RECEIVER BLOCK
During normal operation, the Receiver Block accepts serial
data as inputs at the rate of 125 Mbps from the Clock Recovery Device (DP83231). During the Internal loopback
mode of operation, the Receiver Block accepts data from
the Transmitter Block as input.
The Receiver Block performs the following operations:

The DP8355 PLAYER device has two PHY Port Interfaces
and the DP83251 has only one PHY Port Interface.

• Converts the incoming data stream from NRZI to NRZ, if
necessary

Control Bus Inter1ace
The Control Bus Interface connects the PLAYER device to
a wide variety of microprocessors and microcontrollers. The
Control Bus is an asynchronous interface which provides
access to 32 8-bit registers.

• Decodes the data from 5B to 4B coding
• Converts the serial bit stream into National byte-wide
code
• Compensates for the differences between the upstream
and local clocks

Clock Inter1ace
The Clock Interface consists of 12.5 MHz and 125 MHz
clocks used by the PLAYER device.

• Decodes Line States
• Detects link errors
Finally, the Receiver Block presents data symbol pairs to
the Configuration Switch Block.

The clocks are generated by either the Clock Distribution
Device (COD device) or the Clock Recovery Device (CRD
device).

• User definable enable signals
• Synchronization for cascaded PLAYER devices (a highperformance non-FOOl mode)

The Receiver Block consists of the following functional
blocks:
NRZI to NRZ Decoder
Shift Register
Framing logiC
Symbol Decoder
line State Detector
Elasticity Buffer
link Error Detector

• CMOS power and ground, and ECl ground and power

See Rgure 3-1.

Miscellaneous Inter1ace
The Miscellaneous Interface consists of:
• A reset signal
• User definable sense signals

TO CONFIGURATION SWITCH

TO REGISTERS

FROM TRANSMITTER BLOCK
(INTERNAL LOOPBACK)
FROM SERIAL INTERFACE

TLlF/103B6-3

FIGURE 3·1. Receiver Block Diagram

2-40

C

3.0 Functional Description

."
Q)
c.,)

(Continued)
Idle Line State
The Line State Detector recognizes the incoming data to be
in the Idle Line State upon the reception of 2 Idle symbol
pairs nominally (plus up to 9 bits of 1 in start up cases).
Idle Line State indicates the preamble of a frame or the lack
for frame transmission during normal operation. Idle Line
State is also used in the handshake sequence of the PHY
Connection Management process.

NRZI TO NRZ DECODER
The NRZI to NRZ Decoder converts Non-Return-To-ZeroInvert-an-Ones data to Non-Return-To-Zero data.
This function can be enabled and disabled through bit 7
(RNRi) of the Mode Register (MR). When the bit is cleared,
it converts the incoming bit stream from NRZI to NRZ.
When the bit is set the incoming NRZ bit stream is passed
unchanged.
SHIFT REGISTER
The Shift Register converts the serial bit stream into symbol-wide data for the 58/48 Decoder.
The Shift Register also provides byte-wide data for the
Framing Logic.

TABLE 3-1. Symbol Decoding
Symbol

a
1
2
3
4
5
6
7
B

FRAMING LOGIC
The Framing Logic performs the Framing function by detecting the beginning of a frame or the Halt-Halt or Halt-Quiet
symbol pair.
The J-K symbol pair (11000 10001) indicates the beginning
of a frame during normal operation. The Halt-Halt (00100
00100) and Halt-Quiet (00100 00000) symbol pairs are detected during Connection Management (CMT).
Framing can be temporarily suspended (Le. framing hold), in
order to maintain data integrity. The Framing Hold rules are
explained in Section B.l.

9
A
8
C
0
E
F

SYMBOL DECODER
The Symbol Decoder is a two level system. The first level is
a 5-bit to 4-bit converter, and the second level is a 4-bit
symbol pair to the NSC byte-wide code converter.
The first level latches the received 5-bit symbols and decodes them into 4-bit symbols. Symbols are decoded into
two types: data and control. The 4-bit symbols are sent to
the Line State Detector and the second level of the Symbol
Decoder. See Table 3-1 for the 58/48 Symbol Decoding
list.
The second level translates two 4-bit symbols from the 58/
48 converter and the line state information from the Line
State Detector into the National byte-wide code. More details on the National byte-wide code can be found 'in Section
B.6.

I (Idle)
H(Halt)
JK (Starting
Delimiter)
T (Ending
Delimiter)
R (Reset)
S(Set)
Q(Quiet)
V (Violation)
V
V
V
V
V
V
V
V'

LINE STATE DETECTOR
The FOOl Physical Layer (PHY) standard specifies eight
Line States that the Physical Layer can transmit. These Line
States are used in the Connection Management process.
They are also used to indicate data within a frame during the
normal operation.
The Line State Detector detects nine Line States, one more
than the required Line States specified in the standard.
The Line States are reported through the Current Receive
State Register (CRSR), Receive Condition Register A
(RCRA), and Receive Condition Register 8 (RCR8).

I'

Incoming 5B

Decoded4B

11110
01001
10100
10101
01010
01011
01110
01111
10010
10011
10110
10111
11010
11011
11100
11101

0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111

11111
00100
11000&
10001
01101

1010
0001
1101

00111
11001
00000
00001
00010
00011
00101
00110
01000
01100
10000

0101
0110
0111
0010
0010
0010
0010
0010
0010
0010
0010
0010
0011
1011

Noles:
V' denotes PHY Invalid or an Elasticity Buffer stuff byte.
I' denotes Idle symbol in ILS or an Elasticity Buffer stuff byte.

Line States Description
Active Line State
The Line State Detector recognizes the incoming data to be
in the Active Line State upon the reception of the Starting
Delimiter (JK symbol pair).
The Line State Detector continues to indicate Active Line
State while receiving data symbols, Ending Delimiter (T
symbols), and Frame Status symbols (R and S) after the JK
symbol pair.

Super Idle Line State
The Line State Detector recognizes the incoming data to be
in the Super Idle Line State upon the reception of eight consecutive Idle symbol pairs nominally (plus 1 symbol pair).
The Super Idle Line State is used to insure synchronization.

2-41

N
U1

.....

......
C

."
Q)
c.,)

N
U1
U1

3.0 Functional Description (Continued)
ceive Clock, while data is read from the registers with the
Local Byte Clock.
'

No Signal Detect
The Line State Detector recognizes the incoming data to be
in the No Signal Detect state upon the deassertion of the
Signal Detect signal. No Signal Detect indicates that the
incoming link is inactive.

The Elasticity Buffer will recenter (i.e. set the read and write
pOinters to a predetermined distance from each other) upon
the dete,ction of a JK or every four byte times during PHY
Invalid (i.e. MLS, HLS, QLS, NLS, NSD) and Idle Line State.
To resolve metastability problems, the Elasticity Buffer is
deSigned such that a given register cannot be written and
read simultaneously under normal operating conditions. In a
symbol-wide station, a 5-bit off boundary JK following after a
maximum size frame situation may be produced which may
result in a sma" increase in the probability of an error
caused by a metastability condition.

Master Line State
The Line State Detector recognizes the incoming data to be
in the Master Line State upon the reception of eight consecutive Halt-Quiet symbol pairs nominally (plus up to 2 symbol
pairs in start up cases).
The Master Line State is used in the handshake sequence
of the PHY Connection Management process.
Halt Line State

LINK ERROR DETECTOR

The Line State Detector recognizes the incoming data to be
in the Halt Line State upon the reception of eight consecutive Halt symbol pairs nominally (plus up to 2 symbol pairs in
start up cases).

The Link Error Detector provides continuous monitoring of
an active link (i.e. during Active and Idle Line States) to
insure that it meets the minimum Bit Error Rate requirement
as set by the standard or user to remain on the ring.
Upon detecting a link error, the internalB-bit Link Error Monitor Counter is decremented. The start value for the Link
Error Monitor Counter is programmed through the Link Error
Threshold Register (LETR). When the Link Error Monitor
Counter reaches zero, bit 4 (LEMn of the Interrupt Condition Register (lCR) is set to 1. The current value of the Link
Error Monitor Counter can be read through the Current Link
Error Count Register (CLECR). For higher error rates the
current value is an approximate count because the counter
rolls over.
There are two ways to determine Link Error Rate: polling
and interrupt.

The Halt Line State is used in the handshake sequence of
the PHY Connection Management process.
Quiet Line State
The Line State Detector recognizes the incoming data to be
in the Quiet Line State upon the reception of eight consecutive Quiet symbol pairs nominally (plus up to 9 bits of 0 in
start up cases).
The Quiet Line State is used in the handshake sequence of
the PHY Connection Management process.
Noise Line State
The Line State Detector recognizes the incoming data to be
in the Noise Line State upon the reception of 16 noise symbol pairs.

Polling
The Link Error Monitor Counter is set to the value of FF.
This start value is programmed through the Link Error
Threshold Register (LETR).

The Noise Line State indicates that data is not received
correctly. A detailed description of a noise event can be
found in Section B.2.

Upon detecting a link error, the Current Link Error Counter is
decremented.
The Host System reads the current value of the Link Error
Monitor Counter via the Current Link Error Count Register
(CLECR). The Counter is then reset to FF.

Line State Unknown
The Line State Detector recognizes the incoming data to be
in the Line State Unknown state upon the reception of one
inconsistent symbol pair (i.e. data that is not expected). This
may be the beginning of a new line state.

Interrupt
The Link Error Monitor Counter is set to the value of FF.
This start value is programmed through the Link Error
Threshold Register (LETR).
Upon detecting a link error, the Line Error Monitor Counter
is decremented. When the counter reaches zero, bit 4
(LEMn of the Interrupt Condition Register (ICR) is set to 1,
and the interrupt Signal goes low.

Line State Unknown indicates that data is not received correctly. If the condition persists the noise line state may be
entered.

ELASTICITY BUFFER
The Elasticity Buffer performs the function of a "variable
depth" FIFO to compensate for clock skews between the
Receive Clock (RXC ±) and the Local Byte Clock (LBC).
Bit 5 (EBOU) of the Receive Condition Register B (RCRB) is
set to 1 to indicate an error condition when the Elasticity
Buffer cannot compensate for the clock skews.

The Host System is interrupted when the Link Error Monitor
Counter reaches O.
A state table describing Link Errors in more detail can be
found in Section B.3.

The Elasticity Buffer wi" support maximum clock skews of
± 50 ppm with a maximum packet length of 4500 bytes.
To make up for the accumulation of frequency disparity between the two clocks, the Elasticity Buffer wi" insert or delete Idle symbol pairs in the preamble. Data is written into
the byte-wide registers of the Elasticity Buffer with the Re-

Miscellaneous Items
When bit d (RUN) of the Mode Register (MR) is set to zero,
or when the PLAYER device is reset through the Reset pin
(RSn, the Signal Detect line (TTLSD) is internally forced to
zero and the Line State Detector is set to Line State Unknown.

2-42

C

."

3.0 Functional Description (Continued)

CD

Co)

While in the External Loopback mode, the Transmitter Block
presents serial data to the Clock Recovery Device.

3.2 TRANSMITTER BLOCK
The Transmitter Block accepts 1a-bit bytes from the Configuration Switch.

The Transmitter Block consists of the following functional
blocks:

The Transmitter Block performs the following operations:

Data Registers
Parity Checker
4B/5B Encoder
Repeat Filter
Smoother
Line State Generator
Injection Control Logic
Shift Register
NRZ to NRZI Encoder

• Encodes the data from 4B to 5B coding
• Filters out code violations from the data stream
• Is capable of generating Idle, Master, Halt, Quiet, or other user defined symbol pairs
• Converts the data stream from NRZ to NRZI ready for
transmission
• Serializes data
During normal operation, the Transmitter Block presents serial data to the fiber optic transmitter.

!

I

REPEATER FILTER

I

SMOOTHER

!

\

1

1
!

I

SHIFT REGISTER

r

NRZ TO NRZI ENCODER

~

--.
I

(II
(II

PARITY CHECKER

•

I

!

\

TO RECEIVER
BLOCK

..

I

...
4B/5B ENCODER

N

REGISTERS

DATA REGISTER

I

(II

......
....
C
~

See Figure 3-2.

CONFIGURATION SWITCH

I

N

I

I

LINE STATE GENERATOR --.

~

/
!
/

I INJECTION CONTROL LOGIC

I

I

I

SERIAL INTERFACE
TUF/10386-4

FIGURE 3-2. Transmitter Block Diagram

2-43

•

:g
N

CO)

co

D-

C
......
....

It)

N

CO)

3.0 Functional Description (Continued)
LINE STATE GENERATOR
The Line State Generator allows the transmission of the
PHY Request data and can also generate and transmit Idle,
Master, Halt, or Quiet symbol pairs which can be used to
implement the Connection Management procedures as
specified in the FOOl Station Management (SMT) document.
The Line State Generator is programmed through Transmit
bits 0 to 2 (TM <2:0» of the Current Transmit State Register (CTSR).
Based on the setting of these bits, the Transmitter Block
operates in the Transmit Modes where the Line State Generator overwrites the Repeat Filter and Smoother outputs.

DATA REGISTERS
Data from the Configuration Switch is stored in the Data
Registers. The 10-bit byte-wide data consists of a parity bit,
a control bit, and two 4-bit symbols as shown in Figure 3-3.

~

b8

C

Control Bit

bO

b7
Data Bits

FIGURE 3·3. Byte·Wide Data
PARITY CHECKER
The Parity Checker verifies that the parity bit in the Data
Register represents odd parity (I.e. odd number of 1s).
The parity checking is enabled and disabled through bit 6
(PRDPE) of the Current Transmit State Register (CTSR).
If a parity error occurs, the Parity Checker will set bit 0 (OPE)
in the Interrupt Condition Register (ICR) and report the error
to the Repeat Filter.

See Table 3-3 for the listing of the Transmit Modes.
TABLE 3·2. 4B/5B Symbol Encoding

4B/5B ENCODER
The 4B/5B Encoder converts the two 4-bit symbols from
the Configuration Switch into their respective 5-bit codes.
See Table 3-2 for the Symbol Encoding list.
REPEAT FILTER
The Repeat Filter· is used to preven.t the propagation of
code violations in data frames, to the downstream station.

Symbol

4BCode

Outgoing5B

0
1
2
3
4
5

0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111

11110
01001
10100
10101
01010
01011
01110
01111
10010
10011
10110
10111
11010
11011
11100
11101

0000

111100r
11111
11000 and
10001
01101

6
7·
B

Upon receiving violations in data frames, the Repeat Filter
replaces them with two Halt symbol pairs followed by Idle
symbols. Thus the code violations are isolated and recovered at each link and will not be propagated throughout the
entire ring.

9
A
B
C

Details on Repeat Filter operation are described in Section

0

8.4.

E
F

SMOOTHER
The Smoother is used to keep the preamble length of a
frame to a minimum of 6 Idle symbol pairs.
Idle symbols in the preamble of a frame may have been
added or deleted by each station to compensate for the
difference between the Receive Clock and its Local Clock.
The preamble needs to be maintained at a minimum length
to allow stations enough time to complete processing of one
frame and prepare to receive another. Without the Smoother function, the minimum preamble length (6 Idle symbol
pairs) may not be maintained as several stations may consecutively delete Idle symbols.

N
JK
T
R
S

(Starting
Delimiter)
(Ending
Delimiter)
(Reset)
(Set)

1101
0100 or
0101
0110
0111

00111
11001

TABLE 3-3. Transmit Modes

The Smoother attempts to keep the number of Idle symbol
pairs in the preamble at 7 by:

Active Transmit Mode

Normal Transmission Mode

Off Transmit Mode

• Deleting an Idle symbol pair in preambles which have
more than 7 Idle symbol pairs
and lor

Transmit Quiet symbol pairs
and disable the Fiber OptiC
Transmitter

Idle Transmit Mode

Transmit Idle symbol pairs

Master Transmit Mode

Transmit Halt·Quiet symbol
pairs

Quiet Transmit Mode

Transmit Quiet symbol pairs

Reserved Transmit
Mode

Reserved for future use. If
selected, Quiet symbol pairs
will be transmitted.

Halt Transmit Mode

Transmit Halt symbol pairs

• Inserting an Idle symbol pair in preambles which have
less than 7 idle symbol pairs (i.e. Extend State).
The Smoother Counter starts counting upon detecting an
Idle symbol pair. It stops counting upon detecting a JK symbol pair.
More details on the operation of the Smoother can be found
in Section 8.5.

2-44

3.0 Functional Description (Continued)
In the No Injection mode, the data stream is transmitted
unchanged.
In the One Shot mode, ISRA and ISRB are injected once on
the nth byte after a JK, where n is the programmed value
specified in the Injection Threshold Register.
In the Periodic mode, ISRA and ISRB are injected every nth
symbol.
In the Continuous mode, all data symbols are replaced with
the contents of ISRA and ISRB. This is the same as periodic
mode with IJTR = O.

INJECTION CONTROL LOGIC
The Injection Control Logic replaces the data stream with a
programmable symbol pair. This function is used to transmit
data other than the normal data frame or Line States.
The Injection Symbols overwrite the Line State Generator
(Transmit Modes) and the Repeat Filter and Smoother outputs.
These programmable symbol pairs are stored in the Injection Symbol Register A (ISRA) and Injection Symbol Register B (ISRB). The Injection Threshold Register (IJTR) determines where the Injection Symbol pair will replace the data
symbols.
The Injection Control LogiC is programmed through the bits
o and 1 (IC<1:0» of the Current Transmit State Register
(CTSR) to one of the following Injection Modes (see Figure

SHIFT REGISTER
The Shift Regiser converts encoded parallel data to serial
data. The parallel data is clocked into the Shift Register by
the Transmit Byte Clock (TBC±), and clocked out by the
Transmit Bit Clock (TXC ±).

3-4):

NRZ TO NRZI ENCODER
The NRZ to NRZI Encoder converts the serial Non-ReturnTo-Zero data to Non-Return-To-Zero-Invert-On-One data.
This function can be enabled and disabled through bit 6
(TNRZ) of the Mode Register (MR). When programmed to
"0", it converts the bit stream from NRZ to NRZI. When
programmed to "1", the bit stream is transmitted NRZ.

1. No Injection (i.e. normal operation)
2. One Shot
3. Periodic
4. Continuous

One Shot (Notes 1, 3)
nth

I
I

D

I

D

I· I

D

I··· I

D

n=O

I
1

1

XX

TL/F/l0386-5

•

•

:~:~ 1 xx 1 xx I·· ·1 xx 1:~:d

1 xx 1 xx I·· ·1 xx 1
n=O

XX

n=IJTR

Periodic (Notes 2, 3)

XX

I:;::1

n=1

n=IJTR n=O

n=1

n=IJTR

TL/F/l0366-6

Continuous (Note 3)

TUF/l0386-33

Where
ISRA: Iniection Symbol Register A
ISRB: Injection Symbol Register B
IJTR: Iniection Threshold Register
Note 1: In one shot when n + 0 the JK is replaced.
Note 2: In periodic when n = 0 all symbols are replaced.
Note 3: Max value on n = 255.
FIGURE 3-4. Injection Modes

2-45

•

~~------------------------------------------------~
~

C'I
C')

co

a.

C
.....
..~

C'I
C')

co

a.
C

3.0 Functional Description

(Continued)
PHY Port Interface output data paths, A-Indicate and
B_lndicate, that can drive output data paths of the external
PHY Port Interface. The third output data path is connected
internally to the Transmit Block.
The Configuration Switch is the same on both the DP83251
device and the DP83255 device. However, the DP83255
has two PHY Port interfaces connected to the Configuration
Switch, whereas the DP83251 has one PHY Port Interface.
The DP83255 uses the A-Request and A-Indicate paths
as one PHY Port Interface and the B_Request and B_lndicate paths as the other PHY Port interface (see Figure 35a). The DP83251, having only one port interface, uses the
B_Request and A-Indicate paths as its external port. The
A-Request and B_lndicate paths of the DP83251 are null
connections and are not used by this device (see Figure 35b).

3.3 CONFIGURATION SWITCH
The Configuration Switch consists of a set of multiplexors
and latches which allow the PLAYER device to configure
the data paths without the need of external logic. The Configuration Switch is controlled through the Configuration
Register (CR).
The Configuration Switch has four internal buses, the
A-Request bus, the B_Request bus, the Receive bus, a?d
the PHY_Invalid bus. The two Request buses can be drIven by external input data connected to the external PHY
Port Interface. The Receive bus is internally connected to
the Receive Block of the PLAYER device, while the PHY_
Invalid bus has a fixed 10-bit LSU pattern, useful during the
connection process. The configuration switch also has three
internal multiplexors, each can select any of the four buses
to connect to its respective data path. The first two are

~

~

!;!

.~

~
z

>=

>'

>-

il:

il:

§

fl
0;

il:

...:z:>=

il:

"-REQUEST

"-REQ BUS

PHY INVALID

PHY INVALID

REC BUS

REC BUS

"""~
1

~IT

~
::E

g

~
0

eo

DATA

A

'"enz
g

"""~

""u

I'"

I:

~

TL/Fho386-7

B_INDICATE

J

1

"--~ITDATA

DP83251

"""~
!:

~B_REQUEST

L

B.REQ BUS

"-REQ BUS

"--

1

UNDICATE

I

DP83255

~

L

~
.,

B.REQ BUS

fl

0;

>=

L

~B_REQUEST

"-REQUEST

~

B_INDICATE

UNDICATE

L

~

io! '
~

z

~

::E

~

g

.

g
TL/F/10386-34

FIGURE 3-5a. Configuration Switch Block
Diagram for DP83255

FIGURE 3-5b. Configuration Switch Block
Diagram for DP83251

2-46

C

3.0 Functional Description

."


~

• Flushes the Elasticity Buffer.
• Forces Line State Unknown in the Receiver Block.
• Outputs LSU symbol pairs (0 1 0011 1010) through
the PHY Data Indicate pins (AlP, AIC, AID <7:0>, BIP,
BIC, BID<7:0».

12

e:

TUF/103B6-42

FIGURE 4-1a. Configuration Switch
Loopback for DP83255

• Outputs Quiet symbol pairs through the PMD Data Request pins (TXD±).
• Resets all Control Bus register contents to zero or default values.
oUNDICATE

4.3 LOOPBACK MODE
The PLAYER device provides three types of loopback tests:
Configuration Switch Loopback, Internal Loopback, and External Loopback. These Loopback modes can be used to
test different portions of the device.

A..REQUEST

B..REQUEST

4.3.1 Configuration Switch Loopback
The Configuration Switch Loopback can be used to test the
data paths of the BMAC device(s) that are connected to the
PLAYER device before transmitting and receiving data
through the network.
In the Configuration Switch Loopback mode, the PLAYER
device performs the following functions:

B-REQ BUS _ _

_ J ... ~

UEQ BUS.....

... ~ ... ~

I

_1_

RECBUS----.l----

DP83251

I
I

I
I

I
I

I

I

I

J_~

_1_

~ .....

I
I
_1_
...... -.-I ~ ............... i'"
r _1_I ...... ..

PHY INVALID ........... i ..................

• Selects Port A PHY Request Data, Port B PHY Request
Data, or PHY Invalid to connect to Port A PHY Indicate
Data via the A-IND Mux.

...

I
I

I

-~

, ... ~ ......... i'" .............. ..
--'-------

TRANSMIT DATA

• Selects Port A PHY Request Data, Port B PHY Request
Data, or PHY Invalid to connect to Port B PHY Indicate
Data via the B_IND Mux.
• Connects data from the Receiver Block to the Transmitter Block via the Transmitter_Mux. (The PLAYER device
is repeating incoming data from the media in the Configuration Switch Loopback mode.)

TLlF/10386-43

See Figure 4-18 and 4-1b for block diagrams.

FIGURE 4-1b. Configuration Switch
LoopbackforDP83251
FIGURE 4-1.

2-50

4.0 Modes of Operation

(Continued)
• Outputs Quiet symbols through the External Loopback
Data pins (LBD±).
The level of the Quiet symbols transmitted through the
TXC ± pins is programmable through the Transmit Quiet
Level bit of the Mode Register.
The level of the Quiet symbols transmitted through the
LBD ± pins is always high, regardless of the Transmit Quiet
Level bit of the Mode Register.
If both Internal Loopback and External Loopback modes are
selected, Internal Loopback mode will have priority over External Loopback mode.
See Figure 4-2 for a block diagram.

4.3.2 Internal Loopback
The Internal Loopback mode can be used to test the functionality of the PLAYER device and to test the data paths
between the PLAYER and BMAC devices before ring insertion.
When in the Internal Loopback mode, the PLAYER device
performs the following functions:
• Directs the output data of the Transmitter Block to the
input of the Receiver Block through internal paths (see
Figure 2-1 PLAYER Device Block Diagram).
• Ignores the PMD Data Indicate pins (RXD ± and RXC ±),
• Outputs Quiet symbols through the PMD Data Request
pins (TXD±), and
TO

B~AC

OR PLAYER DEVICE

TO BMAC OR PLAYER DEVICE

PHY PORT INTERFACE
PHY REQUEST DATA

PHY PORT INTERFACE

PHY INDICATE DATA

I

PHY REQUEST DATA

PHY INDICATE DATA

I

CONFIGURATION SWITCH

T

o
C

o

N

T

I

I

t

SERIAL INTERFACE
INDICATE DATA

P~D

+

-L
RECEIVER
BLOCK

CONTROL BUS INTERFACE

REGISTERS

1

'I

TRANSMlnER
BLOCK

I

R

o
L

B
U
S

INTERNAL LOOPBACK PATH

SERIAL INTERFACE
REQUEST DATA

IGNORED INPUTS

P~D

TO FIBER OPTIC

FROM CRD DEVICE

FORCED QUIET SYMBOLS
TRANS~lnER

TL/F/10386-16

FIGURE 4-2. Internal Loopback

fII

2-51

~r-------------------------------------------------------------~
~

N

CO)

CD
D..

Q
......
~

N

CO)

~

Q

4.0 Modes of Operation

(Continued)
• Outputs Quiet symbols through the PMD Data Request
pins (TXD±).

4.3.3 External Loopback
The External Loopback mode can be used to test the functionality of the PLAYER device and to test the data paths
between the PLAYER, CRD, and BMAC devices before
transmitting and receiving data through the network.

The level of the Quiet symbols transmitted through the
TXC± pins is programmable through the Transmit Quiet
Level bit of the Mode Register.

When in the External Loopback mode, the PLAYER device
performs the following functions:

If both Internal Loopbackand External Loopback modes are
selected, Internal Loopback mode will have priority over External Loopback mode.

• Directs the output data of the Transmitter Block to the
external Loopback Data pins (LBD ±), which are normally connected to the Clock Recovery Device (see Figure
2. PLAYER Device Block Diagram).·

TO

B~AC

See Figure 4-3 for a block diagram.

TO

OR PLAYER DEVICE

PHY PORT INTERFACE
PHY REQUEST DATA

B~AC

OR PLAYER DEVICE

PHY PORT INTERFACE

PHY INDICATE DATA

PHY REQUEST DATA

PHY INDICATE DATA
T

1
RECEIVER
BLOCK

I

REGISTERS

SERIAL INTERFACE
INDICATE DATA

o

I

CONFIGURATION SWITCH

C

o

CONTROL BUS INTERFACE

L.

'I TRANS~lmR
BLOCK

I

N
T
R

o
L

B
U
S

SERIAL INTERFACE
REQUEST DATA

P~D

P~D

EXTERNAL LOOPBACK

FORCED QUIET

SY~BOLS

CLOCK RECOVERY DEVICE

IGNORED INPUTS
FROM FIBER OPTIC RECEIVER

TO FIBER OPTIC TRANSMITTER
TUF/l0386-17

FIGURE 4·3. External Loopback

2-52

~----------------------------------------------------------------'C

4.0 Modes of Operation

"V

co

(Continued)

Co)

• Data frames must be a minimum of three bytes long (including the JK symbol pair). Smaller frames will cause
Elasticity Buffer errors.
• Data frames must have a maximum size of 4500 bytes,
with a JK starting delimiter and a (T or R or SIx or x(T or
R or S) ending delimiter byte.

4.4 CASCADE MODE
The PLAYER device can operate in the Cascade (parallel)
mode-Figure 4-4-which is used in high bandwidth, pointto-point data transfer applications. This is a non-FDDI mode
of operation.

CONCEPTS

3. Due to the different clock rates, the JK symbol pair may
arrive at different times at each PLAYER device. The total
skew between the fastest and slowest cascaded PLAYER devices receiving the JK starting delimiter must not
exceed 80 ns.
4. The first PLAYER device to receive a JK symbol pair will
present it to the host system and assert the Cascade
Ready signal. The PLAYER device will present one more
JK as it waits for the other PLAYER devices to recognize
their JK. The maximum number of consecutive JKs that
can be presented to the host is 2.
5. The Cascade Start Signal is set to 1 when all the cascaded PLAYER devices release their Cascade Ready signals.
6. Bit 4 (CSE) of the Receive Condition Register B (RCRB)
is set to 1 if the Cascade Start signal (CS) is not set
before the second falling edge of clock signal LBC from
when Cascade Ready (CR) was released. CS has to be
set within approximately 80 ns of CR release. This condition signifies that not all cascaded PLAYERs have received their respective JK symbol pair within the allowed
skew range.
7. If the JK symbols are corrupted in the point-to-point links,
some PLAYER devices may not report a Cascaded Synchronization Error.
8. To guarantee integrity of the interlrame information, the
user must put at least 8 Idle symbol pairs between
frames. The PLAYER device will function properly with
only 4 Idle symbol pairs, however the interlrame symbols
may be corrupted with random non-JK symbols.
The BMAC device could be used to provide required framing and optical FCS support.

In the Cascade mode, multiple PLAYER devices are connected together to provide data transfer at multiples of the
FDDI data rate. Two cascaded PLAYER devices provide a
data rate twice the FDDI data rate; three cascaded PLAYER
devices provide a data rate three times the FDDI data rate,
etc.
Multiple data streams are transmitted in parallel over each
pair of cascaded PLAYER devices. All data streams start
simultaneously and begin with the JK symbol pair on each
PLAYER device.
Data is synchronized at the receiver of each PLAYER device by the JK symbol pair. Upon receiving a JK symbol pair,
a PLAYER device asserts the Cascade Ready signal to indicate the beginning of data reception.
The Cascade Ready signals of all PLAYER devices are
open drain ANDed together to create the Cascade Start
signal. The Cascade Start signal is used as the input to
indicate that all PLAYER devices have received the JK symbol pair. Data is now being received at every PLAYER device and can be transferred from the cascaded PLAYER
devices to the host system.
See Figure 4-5 for more information.

OPERATING RULES
When the PLAYER device is operating in Cascade mode,
the following rules apply:
1. Data integrity can be guaranteed if the worst case fiber
optic transmission skew between parallel fiber cables is
less than 40 ns. This amounts to about 785 meters of
fiber, assuming a 1 % worst case variance.
2. Even though this is a non-FDDI application, the general
rules for FDDI frames must be obeyed.

N
U1

.....
.....
C

"V

co
Co)

N
U1
U1

fI

2-53

II)
II)

C'\I

C')

co

4.0 Modes of Operation

(Continued)

D..

C

.......
.....
II)
C'\I

C')

co

D..

C

HOST SYSTEM

HOST SYSTEM

TLlF/l0386-18

FIGURE 4·4. Parallel Transmission

CASCADE READY

f

.D.AT.A...·:..1Ij PLAYER
1::IDEVICE:1
RX
RX

...011

.. ...

...

14J___D•A•TAiiIIji.·.otI PLAYER
...... 1 DEVICE 2
~

:::

HOST SYSTEM

...

RX

..

...011
~

illij'

DATA ..:

I

1+.+"::":;=~':';;;':''--,

~
1.1-""":::"-'+--CA-S-C-AD-E-S-T-A-RT-+-+I ~
....

CASCADE READY

:z

~

I:::

z

Cl

~~

.. ::.

r ....... ::: •.....

I"-If~:".. . .I

,I"'....·--....+-C-A-SC-A-D-E-S-TA-R-T--H

PLAYER
DEVICE N

.. .

r.I:.•.•.

CASCADE READY
CASCADE START

TLlF/l0386-19

FIGURE 4·5. Cascade Mode of Operation
Note: N is recommended to be less than 3 for this mode. See Application Note 679 for larger values of N.

2·54

c

5.0 Registers
The PLAYER device is initialized, configured, and monitored via 32 8·bit registers. These registers are accessible through the
Control Sus Interface.

.....
......
U1

C

Table 5·1 is a Register Summary List. Table 5·2 shows the contents of each register.

"

0)
(0)
I\)

TABLE 5·1. Register Summary
Register
Address

Register
Symbol

Access Rules

OOh

MR

Mode Register

Always

Always

Register Name
Read

Write

01h

CR

Configuration Register

Always

Always

02h

ICR

Interrupt Condition Register

Always

Conditional

03h

ICMR

Interrupt Condition Mask Register

Always

Always

04h

CTSR

Current Transmit State Register

Always

Conditional

05h

IJTR

Injection Threshold Register

Always

Always

06h

ISRA

Injection Symbol Register A

Always

Always

07h

ISRB

Injection Symbol Register B

Always

Always

08h

CRSR

Current Receive State Register

Always

Write Reject

09h

RCRA

Receive Condition Register A

Always

Conditional

OAh

RCRB

Receive Condition Register B

Always

Conditional

OSh

RCMRA

Receive Condition Mask Register A

Always

Always

OCh

RCMRB

Receive Condition Mask Register B

Always

Always

ODh

NTR

Noise Threshold Register

Always

Always

OEh

NPTR

Noise Prescale Threshold Register

Always

Always

OFh

CNCR

Current Noise Count Register

Always

Write Reject

10h

CNPCR

Current Noise Prescale Count Register

Always

Write Reject

llh

STR

State Threshold Register

Always

Always

12h

SPTR

State Prescale Threshold Registger

Always

Always

13h

CSCR

Current State Count Register

Always

Write Reject

14h

CSPCR

Current State Prescale Count Register

Always

Write Reject

ISh

LETR

Link Error Threshold Register

Always

Always

16h

CLECR

Current Link Error Count Register

Always

Write Reject

17h

UDR

User Definable Register

Always

Always

18h

IDR

Device ID Register

Always

Write Reject

19h

CIJCR

Current Injection Count Register

Always

Write Reject

lAh

ICCR

Interrupt Condition Comparison Register

Always

Always

ISh

CTSCR

Current Transmit State Comparison Register

Always

Always

lCh

RCCRA

Receive Condition Comparison Register A

Always

Always

tDh

RCCRB

Receive Condition Comparison Register B

Always

Always

lEh

RRO

Reserved Register 0

Always

Write Reject

lFh

RRI

Reserved Register 1

Always

Write Reject

2·55

"

0)
(0)
I\)

U1
U1

5.0 Registers (Continued)
TABLE 5·2. Register Content Summary
Register
Address

Register
Symbol

Bit Symbols
07

06

04'

05

03
CM

02

01

00

EXLB

ILB

RUN

OOh

MR

RNRZ

TNRZ

TE

TaL

01h

CR

BIE

AlE

TRS1

TRSO

BIS1

BISO

AIS1

AlSO

02h

ICR

UDI

RCB

RCA

LEMT

CWI

CCR

CPE

DPE

03h

ICMR

UDIM

RCBM

RCAM

LEMTM

CWIM

CCRM

CPEM

DPEM

04h

CTSR

RES

PRDPE

SE

IC1

ICO

TM2

TM1

TMO

05h

IJTR

IJT7

IJT6

IIJ5

IJT4

IJT3

IJT2

IJT1

IJTO

06h

ISRA

RES

RES

RES

IJS4

IJS3

IJS2

IJS1

IJSO

07h

ISRB

RES

RES

RES

IJS9

IJSB

IJS7

IJS6

IJS5

OBh

CRSR

RES

RES

RES

RES

LSU

LS2

LS1

LSO

OLS

NSD

09h

' RCRA

LSUPI

LSC

NT

NLS

MLS

HLS

OAh

RCRB

RES

SILS

EBOU

CSE

LSUPV

ALS

ST

ILS

OBh

RCMRA

LSUPIM

LSCM

NTM

NLSM

NLSM

HLSM

OLSM

NSDM

OCh

RCMRB

RES

SILSM

EBOUM

CSEM

LSUPVM

ALSM

STM

ILSM

ODh

NTR

RES

NT6

NT5

NT4

NT3

NT2

NT1

NTO

OEh

NPTR

NPT7

NPT6

NPT5

NPT4

NPT3

NPT2

NPT1

NPTO

OFh

CNCR

NCLSCD

CNC6

CNC5

CNC4

CNC3

CNC2

CNC1

CNCO

10h

CNPCR

CNPC7

CNPCS

CNPC5

CNPC4

CNPC3

CNPC2

CNPC1

CNPCO

11h

STR

RES

ST6

ST5

ST4

ST3

ST2

ST1

STO

SPT2

SPT1

SPTO

SPT6

SPT5

SPT4

SPT3

SCLSCD

CSC6

CSC5

CSC4

CSC3

CSC2

CSC1

CSCO

CSPC7

CSPC6

CSPC5

CSPC4

CSPC3

CSPC2

CSPC1

CSPCO

LET6

LET5

LET4

LET3

LET2

LET1

LETO

LEC4

LEC3

LEC2

LEC1

LECO
SBO

12h

SPTR

'SPT7

13h

CSCR

14h

CSPCR

15h

LETR

LET7

CLECR

LEC7

LECS

LEC5

17h

UDR

RES

RES

RES

RES

EB1

EBO

SB1

1Bh

IDR

DID7

DID6

DID5

DID4

DID3

DID2

DiD1

DIDO

19h

CIJCR

IJC7 ,

IJC6

IJC5

IJC4

IJC3

IJC2

IJC1

IJCO

1Ah

ICCR

UDIC

RCBC

RCAC

LEMTC

CWIC

CCRC

CPEC

DPEC

1Bh

'. CTSCR

RESC

PRDPEC

SEC

IC1C

ICOC

TM2C

TM1C

TMOC

1Ch

RCCRA

LSUPIC

LSCC

NTC

NLSC

MLSC

HLSC

OLSC

NSDC

1Dh

RCCRB

RESC

SILSC

EBOUC

CSEC

LSUPVC

ALSC

STC

ILSC

.1Eh

RR1

RES

RES

RES

RES

RES

RES

RES

RES

1Fh

RR2

RES

RES

RES

RES

RES

RES

RES

RES

16h

2-56

c

5.0 Registers

;;g

(Continued)

w
~
.....

MODE REGISTER (MR)

......

The Mode Register is used to initialize and configure the PLAYER device.
In order to minimize interruptions on the network, it is recommended that the PLAYER device first be put in STOP mode (Le. set
the RUN bit to zero) before programming the Mode Register, the Configuration Register, or the Current Transmit State Register.

READ

ADDRESS

I

OOh
D7

I

RNRZ
Bit

Always

D6

I

"tJ

CD
W
N

c.n
c.n

ACCESS RULES

I

C

TNRZ

WRITE

I

D5

I

TE

Always
D4

I

TQL

I
D3

I

CM

Symbol

D2

I

D1

EXLB

I

ILB

DO

I

RUN

I

Description

DO

RUN

RUN/STOP
0: Enables the STOP mode. Refer to Section 4.2, STOP Mode of Operation, for more
information.
1: Normal Operation (i.e. RUN mode).
Note: The RUN bil is aulomalically sello 0 when Ihe RST pin is asserted (i.e. sello ground).

D1

ILB

INTERNAL LOOPBACK:
0: Disables Internal Loopback mode (i.e. normal operation).
1: Enables Internal Loopback mode.

D2

EXLB

EXTERNAL LOOPBACK
0: Disables External Loopback mode (i.e. normal operation).
1: Enables External Loopback mode.

D3

CM

CASCADE MODE:
0: Disables synchronization of cascaded PLAYER devices.
1: Enables the synchronization of cascaded PLAYER devices.

04

TQL

TRANSMIT QUIET LEVEL:. This bit is used to program the transmission level of the Quiet
symbols.
0: Low level Quiet symbols are transmitted through the PMD Data Request pins
(i.e. TXD+ = low, TXD- = high).
1: High level Quiet symbols are transmitted through the PMD Data Request pins
(i.e. TXD+ = high, TXD- = low).

D5

TE

TRANSMIT ENABLE: The TE bit controls the action of FOTX Enable (TXE) pin independent
of the current transmit mode. When TE is 0, the TXE output disables the optical transmitter;
when TE is 1, the optical transmitter is disabled during the Off Transmit Mode (OTM) and
enabled otherwise. The On and Off level of the TXE is dependent on the FOTX Enable Level
(TEL) pin to the PLAYER device. The following rules summarizes the output of TXE:
(1) If TE = 0, then TXE = Off
(2) If TE = 1 and OTM, then TXE = Off
(3) If TE = 1 and not OTM, then TXE = On.

D6

TNRZ

TRANSMIT NRZ DATA:
0: Transmits data in Non-Return-To-Zero-Invert-On-Ones format.
1: Transmits data in Non-Return-To-Zero format.

07

RNRZ

RECEIVE NRZ DATA:
0: Receives data in Non-Return-To-Zero-Invert-On-Ones format.
1: Receives data in Non-Return-To-Zero format.

Refer to Section 4.3, Loopback Mode of Operation, for more information.

Refer to Section 4.3, Loopback Mode of Operation, for more information.

Refer to Section 4.4, Cascade Mode of Operation, for more information.

2-57

•

5.0 Registers

(Continued)

CONFIGURATION REGISTER (CR)
The Configuration Register controls the Configuration Switch Block and enables/disables both the A and B Indicate output
ports.
Note that the B_lndicate output port is offered only on the DP83255 (for Dual Attach Stations), and not in the DP83251 (for
Single Attach Stations).
For further information, refer to Section 3.3, Configuration Switch.
ACCESS RULES
ADDRESS

I
07

I

BIE
Bit

DO,D1

AlE

I

Always

06

I

WRITE

READ

I

01h

05

I

TRS1

Always

I

I

BIS1

04

I

TRSO

BISO,BIS1

BISO

I

AIS1

DO

I

AlSO

I

Description
A.-INDICATE SELECTOR <0, 1>: The ~Indicate Selector <0, 1> bits select one of the four
Configuration Switch data buses for the ~Indicate output port (AlP, AIC, AID < 7:0».
AIS1
0
0
1
1

D2,D3

I

Symbol
AISO,AIS1

01

02

03

AlSO
0
1
0
1

PHY Invalid Bus
Receiver Bus
A-Request Bus
B_Request Bus

B_INDICATE SELECTOR <0, 1>: The B_lndicate Selector <0, 1> bits select one of the four
Configuration Switch data buses for the B_lndicate output port (BIP, BIC, BID <7:0».
BIS1
BISO
0
PHY Invalid Bus
0
0
1
Receiver Bus
1
0
A-Request Bus
B_Request Bus
1
1
Note: Even though this bit can be set andlor cleared in the DPB3251 (for Single Attach Stations), it will not affect
any lias since the DPB3251 does not offer a B_lndicate port.

04,05

TRSO, TRS1

TRANSMIT REQUEST SELECTOR <0, 1>: The Transmit Request Selector <0, 1> bits select
one of the four Configuration Switch data buses for the input to the Transmitter Block.
TRS1
TRSO
PHY Invalid Bus
0
0
0
1
Receiver Bus
1
0
A-Request Bus
B_Request Bus
1
1
Note: If the PLAYER device is in Active Transmit Mode (i.e. the Transmit Mode bits (TM < 2:0> ) of the Current
Transmit State Register (CTSR) are set to 000) and the PHY Invalid Bus is selected, then the PLAYER device will
transmit a maximum of four Halt symbol pairs and then continuous Idle symbols due to the Repeat Filter.

06

AlE

"-INDICATE ENABLE:
0: Disables the A-Indicate output port. The A-Indicate port pins will be at TRI·STATE when
the port is disabled.
1: Enables the A-Indicate output port (AlP, AIC, AID<7:0».

07

BIE

B_INDICATE ENABLE:
0: Disable the B_lndicate output port. The B_lndicate port pins will be at TRI·STATE
when the port is disabled.
1: Enables the B_lndicate output port (BIP, BIC, BID<7:0».
Note: Even though this bit can be set andlor cleared in the DPB3251 (for Single Attach Stations), it will not affect
any lias since the DPB3251 does not offer a B_lndicate port.

2·58

5.0 Registers

(Continued)

INTERRUPT CONDITION REGISTER (ICR)

The Interrupt Condition Register records the occurrence of an internal error event, the detection of Line State, an unsuccessful
write by the Control Bus Interface, the expiration of an internal counter, or the assertion of one or more of the User Definable
Sense pins.
The Interrupt Condition Register will assert the Interrupt pin (IND when one or more bits within the register are set to 1 and the
corresponding mask bits in the Interrupt Condition Mask Register (ICMR) are also set to 1.
ACCESS RULES
READ

ADDRESS

I
D7

I

UDI
Bit

DO

I

02h
D6

I

RCB

WRITE

Always

I

Conditional

I

LEMT

D5

I

D4

RCA

I
D3

I

D2

CWI

Symbol

DPE

I

D1

CCR

I

CPE

DO

I

DPE

I

Description
PHY_REQUEST_DATA PARITY ERROR: This bit will be setto 1 when:

(1) The PHY Request Data Parity Enable bit (PRDPE) of the Current Transmit State Register
(CTSR) is set to 1 and
(2) The Transmitter Block detects a parity error in the incoming PHY Request Data.
The source of the data can be from the PHY Invalid Bus, the Receiver Bus, the A-Bus, or the
B_Bus of the Configuration Switch.
D1

CPE

CONTROL BUS DATA PARITY ERROR: This bit will be set to 1 when:
(1) The Control Bus Parity Enable pin is asserted (CBPE = Vecl and
(2) The Control Bus Interface detects a parity error in the incoming Control Bus Data
(CBD<7:0» during a write cycle.

D2

CCR

CONTROL BUS WRITE COMMAND REJECT: This bit will be set to 1 when an attempt to

write into one of the following read-only registers is made:
Current Receive State Register (Register 08, CRSR)
Current Noise Count Register (Register OF, CNCR)
Current Noise Prescale Count Register (Register 10, CNPCR)
Current State Count Register (Register 13, CSCR)
Current State Prescale Count Register (Register 14, CSPCR)
Current Link Error Count Register (Register 16, CLECR)
Device ID Register (Register 18, IDR)
Current Injection Count Register (Register 19, CIJCR)
Reserved Register 0 (Register 1E, RRO)
Reserved Register 1 (Register 1F, RR1)
D3

CWI

CONDITIONAL WRITE INHIBIT: Set to 1 when bits within mentioned registers do not match
bits in compare register. This bit ensures that new (i.e. unread) data is not inadvertently
cleared while old data is being cleared through the Control Bus Interface.

This bit is set to 1 to prevent the setting or clearing of any bit within the following registers:
Interrupt Condition Register (Register 02, ICR)
Current Transmit State Register (Register 04, CTSR)
Receive Condition Register A (Register 09, RCRA)
Receive Condition Register B (Register OA, RCRB)
when they differ from the value of the corresponding bit in the following registers respectively:
Interrupt Condition Compare Register (Register 1A, ICCR)
Current Transmit State Compare Register (Register 1B, CTSCR)
Receive Condition Compare Register A (Register 1C, RCCRA)
Receive Condition Compare Register B (Register 1D, RCCRB)
This bit must be cleared by software. Note that this differs from the BMAC device bit of the
same name.

2-59

5.0 Registers (Continued)
INTERRUPT CONDITION REGISTER (ICR) (Continued)
Bit

Symbol

04

LEMT

LINK ERROR MONITOR THRESHOLD: This bit is set to 1 when the internalS-bit Link Error Monitor
Counter reaches zero. It will remain set until cleared by software.
During the reset process (i.e. RS'i" = GND), the Link Error Monitor Threshold bit is set to 1 because the
Link Error Monitor Counter is initialized to zero.

D5

RCA

RECEIVE CONDITION A: This bit is set to 1 when:
(1) One or more bits in the Receive Condition Register A (RCRA) is set to 1 and
(2) The corresponding mask bits in the Receive Condition Mask Register A (RCMRA) are also set to 1.
In order to clear (i.e. set to 0) the Receive Condition A bit, the bits within the Receive Condilion Regisler
A Ihal are sello 1 musl firsl be either cleared or masked.

D6

RCB

RECEIVE CONDITION B: This bit is sel to 1 when:
(1) One or more bits in the Receive Condition Register B (RCRB) is set to 1 and
(2) The corresponding mask bits in the Receive Condilion Mask Register B (RCMRB) are also sello 1.
In order 10 clear (i.e. set to 0) the Receive Condition B bit, the bits within the Receive Condilion Register
B that are sello 1 musl first be either cleared or masked.

D7

UDI

USER DEFINABLE INTERRUPT: This bit is set to 1 when one or both of the Sense Bits (SBO or SB1) in
the User Definable Register (UDR) is set to 1.
In order to clear (i.e. set to 0) the User Definable Interrupt Bil, both Sense Bits must be set to O.

Description

2-60

Ie

."

5.0 Registers (Continued)

CD

Co)

INTERRUPT CONDITION MASK REGISTER (ICMR)
The Interrupt Condition Mask Register allows the user to dynamically select which events will generate an interrupt.
The Interrupt pin will be asserted (i.e. INT = GND) when one or more bits within the Interrupt Condition Register (lCR) are set to
1 and the corresponding mask bits in this register are also set to 1.
This register is cleared (i.e. set to 0) and all interrupts are initially masked during the reset process.
ACCESS RULES
ADDRESS

I

I

03h
07

I

UDIM

READ

I

I

Always
05

06
RCBM

WRITE

I

RCAM

Always
04

I

LEMTM

I
03

I

02

CWIM

I

CCRM

01

I

CPEM

DO

I

DPEM

I

Bit

Symbol

Description

DO

DPEM

PHY_REQUEST_DATA PARITY ERROR MASK: The mask bit for the PHY_Request Data Parity
Error bit (DPE) of Interrupt Condition Register (ICR).

D1

CPEM

CONTROL BUS DATA PARITY ERROR MASK: The mask bit for the Control Bus Data Parity Error bit
(CPE) of the Interrupt Condition Register (ICR).

D2

CCRM

CONTROL BUS WRITE COMMAND REJECT MASK: The mask bit for the Control Bus Write
Command Reject bit (CCR) of the Interrupt Condition Register (ICR).

D3

CWIM

CONDITIONAL WRITE INHIBIT MASK: The mask bit for the Conditional Write Inhibit bit (CWI) of the
Interrupt Condition Register (lCR).

D4

LEMTM

LINK ERROR MONITOR THRESHOLD MASK: The mask bit for the Link Error Monitor Threshold bit
(LEMT) of the Interrupt Condition Register (ICR).

D5

RCAM

RECEIVE CONDITION A MASK: The mask bit for the Receive Condition A bit (RCA) of the Interrupt
Condition Register (ICR).

D6

RCBM

RECEIVE CONDITION B MASK: The mask bit for the Receive Condition B bit (RCB) of the Interrupt
Condition Register (ICR).

D7

UDIM

USER DEFINABLE INTERRUPT MASK: The mask bit for the User Definable Interrupt bit (UDI) of the
Interrupt Condition Register (lCR).

2·61

N

....
.....
(It

Ie

."
CD

Co)

N

(It
(It

5.0 Registers (Continued)
CURRENT TRANSMIT STATE REGISTER (CTSR)
The Current Transmit State Register can program the Transmitter Block to internally generate and transmit Idle, Master, Halt,
Quiet, or user programmable symbol pairs, in addition to the normal transmission of incoming PHY Request data. The Smoother
and PHY Request Data Parity may also be enabled and disabled through this register.
The Transmit Modes overwrite the Repeat Filter and Smoother outputs, while the Injection Symbols overwrite the Transmit
Modes.
During the reset process (i.e. RSi = GND) the Transmit Mode is set to Off (TM <2:0> = 010), the Smoother is enabled (i.e. SE
is set to 1), and the Reserved bit (b7) is set to 1. All other bits of this register are cleared (i.e. set to 0) during the reset process.
ACCESS RULES
ADDRESS

I
07

I

RES

READ

I

04h

06

I

PRDPE

WRITE

I

Always

Conditional

05

I

SE

04

I

IC1

I
03

I

ICO

02

I

TM2

01

I

TM1

DO

I

TMO

I

Bit

Symbol

Description

00,01,
02

TMO, TM1,
TM2

Transmit Mode < 0, 1, 2>: These bits select one of the 6 transmission modes for the PMD Request
Data output port (TXD ±).
TM2

TM1

TMO

o

o

o

o

o

Active Transmit Mode (ATM): Normal
transmission of incoming PHY Request data.
Idle Transmit Mode (ITM): Transmission of
Idle symbol pairs (11111 11111).

o

o

o

Off Transmit Mode (OTM): Transmission of
Quiet symbol pairs (00000 00000) and
. deassertion of the FOTX Enable pin (TXE).
Reserved: Reserved for future use. Users
are discouraged from using this transmit
mode. If selected, however, the transmitter
will generate Quiet symbol pairs (00000
00000).

o

o

o

Master Transmit Mode (MTM):
Transmission of Halt and Quiet symbol pairs
(0010000000).
Halt Transmit Mode (HTM): Transmission of
Halt symbol pairs (00100 00100).

o

Quiet Transmit Mode (QTM): Transmission
of Quiet symbol pairs (00000 00000).
Reserved: Reserved for future use. Users
are discouraged from using this transmit
mode. If selected, however, the transmitter
will generate Quiet symbol pairs (00000
00000).

2·62

o
5.0 Registers

"

CO
W

(Continued)

I'\)

CURRENT TRANSMIT STATE REGISTER (CTSR) (Continued)
Bit

Symbol

D3,D4

ICO,lCl

Description
Injection Control < 0, 1 >: These bits select one of the 4 injection modes. The injection modes
overwrite data from the Smoother, Repeat Filter, Encoder, and Transmit Modes.

en
....
......

o

"

CO
W

I'\)

en
en

ICO is the only bit of the register that is automatically cleared by the PLAYER device after the One Shot
Injection is executed. The automatic clear of ICO during the One Shot mode can be int!lrpreted as an
acknowledgment that the One Shot has been completed.

D5

SE

IC1
0

ICO
0

0

1

One Shot: In one shot mode, Injection
Symbol Register A (ISRA) and Injection
Symbol Register B (ISRB) are injected n
symbol pairs after a JK, where n is the
programmed value of the Injection Count
Register (IJCR). If IJCR is set to 0, the JK
symbol pair is replaced by ISRA and ISRB.
Once the One Shot is executed, the PLAYER
device automatically sets ICO to 0, thereby
returning to normal transmission of data.

1

0

Periodic: In Periodic mode, Injection Symbol
Register A (ISRA) and Injection Symbol .
Register B (ISRB) are injected every (n + 1)th
symbol pair, where n is the programmed
value of the Injection Count Register (IJCR).
If IJCR is set to 0, all data symbols are
replaced with ISRA and ISRB.

1

1

Continuous: In Continuous mode, all data
symbols are replaced with Injection Symbol
Register A (ISRA) and Injection Symbol
Register B (ISRB).

No Injection: The normal transmission of
incoming PHY Request data (i.e. symbols are
not injected).

SMOOTHER ENABLE:
0: Disables the Smoother.
1: Enables the Smoother.
When enabled, the Smoother can redistribute Idle symbol pairs which were added or deleted by
the local or upstream receivers.
Note: Once the counter has started, it will continue to count irrespective of the incoming symbols with the exception of a
JK symbol pair. This bit should be enabled for interoperable operation.

D6

PRDPE

PHY_REQUEST DATA PARITY ENABLE:
0: Disables PHY_Request Data parity.
1: Enables PHY_Request Data parity.

D7

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset process. It may be set or
cleared without any effects to the functionality of the PLAYER device.

2-63

•

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,
,U)

C'I

C")

CIO

~
.....

....

U)

C'I

C")

~

C

5.0 Registers

(Continued)

INJECTION THRESHOLD REGISTER (lJTR)
The Injection Threshold Register, in conjunction with the Injection Control bits (IC< 1:0» in the Current Transmit State Register
(CTSR), set the frequency at which the Injection Symbol Register A (ISRA) and Injection Symbol Register B (ISRB) are inserted
into the data stream. It contains the start value for the Injection Counter.
The Injection Threshold Register value is loaded into the Injection Counter when the counter reaches zero or during every
Control Bus Interface write-cycle of this register.
The'lnjection Counter is an 8-bit down-counter which decrements every 80 ns. Its current value is read for CIJCR.
The counter is active only during One Shot or Periodic Injection Modes (i.e. Injection Control<1:0> bits (lC<1:0» of the
Current Transmit State Register (CTSR) are set to either 01 or 10). The Transmitter Block will replace a data symbol pair with
ISRA and ISRB when the counter reaches 0 and the Injection Mode is either One Shot or Periodic.
If the Injection Threshold Register is set to 0 during the One Shot mode, the JK will be replaced with ISRA and ISRB. If the
Injection Threshold Register is set to 0 during the Periodic mode, all data symbols are replaced with ISRA and ISRB.
The counter is initialized to 0 during the reset process (i.e. RST = GND).
For further information, see the' Injection Control Logic subsection within Section 3.2.
ACCESS RULES
ADDRESS

I
07

I

IJT7

Bit

Always

06

I

WRITE

READ

I

05h

IJT6

I

05

I

IJT5

Always

04

I

IJT4

I
02

03

I

IJT3

Symbol

I

IJT2

01

I

IJT1

DO

I

IJTO

I

Description

00

IJTO

INJECTION THRESHOLD BIT <0>: Least significant bit (LSB) of the start
value for the Injection Counter.

01-6

IJTl-6

INJECTION THRESHOLD BIT < 1-6>: Intermediate bits of start value for the
Injection Counter.

07

IJT7

INJECTION THRESHOLD BIT <7>: Most significant bit (MSB) of the start
value for the Injection Counter.

2-64

c
5.0 Registers

~

(Continued)

Co)

N
U1

INJECTION SYMBOL REGISTER A (ISRA)
The Injection Symbol Register A, along with Injection Symbol Register B, contains the programmable value (already in 5B code)
that will replace the data symbol pairs.
The One Shot mode, ISRA and ISRB are injected n bytes after the next JK, where n is the programmed value of the Injection
Threshold Register. In the Periodic mode, ISRA and ISRB are injected every nth symbol pair. In the Continuous mode, all data
symbols are replaced with ISRA and ISRB.
ACCESS RULES
ADDRESS

I
D7

I

READ

I

06h

RES
Bit

Always

D6

I

RES

I

"'CJ

c»
Co)
N
U1
U1

WRITE

I

D5
RES

.....

"C

Always

D4

I

IJS4

I
D2

D3

I

IJS3

Symbol

I

IJS2

D1

I

IJS1

DO

I

IJSO

I

Description

00

IJSO

INJECTION THRESHOLD BIT <0>: Least significant bit (LSB) of Injection
Symbol Register A.

01-3

iJSl-3

INJECTION THRESHOLD BIT < 1-3>: intermediate bits of Injection Symbol
RegisterA.

04

IJS4

INJECTION THRESHOLD BIT <4>: Most significant bit (MSB) of injection
Symbol Register A.

05

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset
process. It may be set or cleared without any effects to the functionality of the PLAYER
device.

D6

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset
process. It may be set or cleared without any effects to the functionality of the PLAYER
device.

07

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset
process. It may be set or cleared without any effects to the functionality of the PLAYER
device.

•
2-65

it)
it)

C'I
C")

5.0 Registers (Continued)

CCI

a.
Q
......
.,..
it)

C'I

C")

CCI

a.
Q

INJECTION SYMBOL REGISTER B (ISRB)
The Injection Symbol Register B, along with Injection Symbol Register A, contains the programmable value (already in 5B code)
that will replace the data symbol pairs.
The One Shot mode, ISRA and ISRB are injected n bytes after the next JK, where n is the programmed value of the Injection
Threshold Register. In the Periodic mode, ISRA and ISRB are injected every nth symbol pair. In the Continuous mode, all data
symbols are replaced with ISRA and ISRB.
ACCESS RULES
ADDRESS

I
07

I

READ

I

07h

RES

Bit

Always

06

I

RES

WRITE

I

05

I

RES

Always

04

I

IJS9

I
03

I

02

IJS8

I

Symbol

IJS7

01

I

IJS6

DO

I

IJS5

I

Description

00

IJS5

INJECTION THRESHOLD BIT<5>: Least significant bit (LSB) of Injection
Symbol Register B.

01-3

IJS6-8

INJECTION THRESHOLD BIT <6-8>: Intermediate bits of Injection Symbol
Register B.

04

IJS9

INJECTION THRESHOLD BIT <9>: Most significant bit (MSB) of Injection
Symbol Register B.

05

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset
process. It may be set or cleared without any effects to the functionality of the PLAYER
device.

06

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset
process. It may be set or cleared without any effects to the functionality of the PLAYER
device.

07

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. The reserved bit is set to 1 during the reset
process. It may be set or cleared without any effects to the functionality of the PLAYER
device.

2-66

C

5.0 Registers

"'tI
CCI

(Continued)

IN
N
U1

CURRENT RECEIVE STATE REGISTER (CRSR)
The Current Receive State Register represents the current line state being detected by the Receiver Block. Once the Receiver
Block recognizes a new Line State, the bits corresponding to the previous line state are cleared, and the bits corresponding to
the new line state are set.
During the reset process (RST = GND), the Receiver Block is forced to Line State Unknown (Le. the Line State Unknown bit
(LSU) is set to 1).
ACCESS RULES
ADDRESS
08h

READ

WRITE

Always

Write Reject

D7

D6

D5

D4

D3

D2

D1

DO

RES

RES

RES

RES

LSU

LS2

LS1

LSO

Bit

Symbol

00,01
02

LSO, LS1,
LS2

..........
C

"'tI
CCI

IN
N
U1
U1

Description
LINE STATE <0, 1,2>: These bits represent the current Line State being detected by the Receiver
Block. Once the Receiver Block recognizes a new line state, the bits corresponding to the previous
line state are cleared, and the bits corresponding to the new line state are set.
LS2
0

LS1
0

LSO
0

0

0

1

Idle Line State (ILS): Received a minimum
of two consecutive Idle symbol pairs (11111
11111).

0

1

0

No Signal Detect (NSD): The Signal Detect
pin (TTLSD) has been deasserted, indicating
that the Clock Recovery Device is not
receiving data from the Fiber Optic Receiver.

0

1

1

Reserved: Reserved for future use.

1

0

0

Master Line State (MLS): Received a
minimum of 8 consecutive Halt-Quiet symbol
pairs (0010000000).

1

0

1

Halt Line State (HLS): Received a minimum
of 8 consecutive Halt symbol pairs (00100
00100).

1

1

0

Quiet Line State (QLS): Received a
minimum of 8 consecutive Quiet symbol pairs
(0000000000).

1

1

1

Noise Line State (NLS): Detected a
minimum of 16 noise events. Refer to the
Receiver Block for further information on
noise events.

Active Line State (ALS): Received a JK
symbol pair (11 000 10001), and possibly
followed by data symbols.

03

LSU

LINE STATE UNKNOWN: The Receiver Block has not detected the minimum conditions to enter a
known line state. When the Line State Unknown bit is set, LS < 2:0 > represent the most recently
known line state.

04

RES

RESERVED: Reserved for future use. The reserved bit is set to O.
Note: Users are discouraged from using this bit. An attempt to write into this bit will cause the PLAYER device to ignore
the Control Bus write cycle and set the Control Bus Write Command Reject bit (CCR) of the Interrupt Condition
Register (ICR) to 1.

2-67

•

5.0 Registers (Continued)
CURRENT RECEIVE STATE REGISTER (CRSR) (Continued)
Bit

Symbol

05

RES

Description
RESERVED: Reserved for future use. The reserved bit is set to O.
Note: Users are discouraged from using this bit. An attempt to write into this bit will cause the PLAYER device to ignore the
CBUS write cycle and set the Control Bus Write Command Reject bit (CCR) of the Interrupt Condition Register (ICR) to 1.

06

RES

RESERVED: Reserved for future use. The reserved bit is set to O.
Note: Users are discouraged from using this bit. An attempt to write into this bH will cause the PLAYER device to ignore the
CBUS write cycle and set the Control Bus Write Command Reject bit (CCR) of the Interrupt Condition Register (lCR) to 1.

07

RES

RESERVED: Reserved for future use. The reserved bit is set to O.
Note: Users are discouraged from using this bit. An attempt to write into this bit will cause the PLAYER device to ignore the
CBUS write cycle and set the Control Bus Write Command Reject bit (CCR) of the Interrupt Condition Register (lCR) to 1.

2-68

5.0 Registers

(Continued)

RECEIVE CONDITION REGISTER A (RCRA)
The Receive Condition Register A maintains a historical record of the Line States recognized by the Receiver Block.
When a new Line State is entered, the bit corresponding to that line state is set to 1. The bits corresponding to the previous Line
States are not cleared by the PLAYER device, thereby maintaining a record of the Line States detected.
The Receive Condition A bit (RCA) of the Interrupt Condition Register (ICR) will be set to 1 when one or more bits within the
Receive Condition Register A is set to 1 and the corresponding mask bit(s) in Receive Condition Mask Register A (RCMRA) is
also set to 1.
ACCESS RULES
ADDRESS

I
07

I

LSUPI
Bit

READ

I

09h

06

I

WRITE

Always

I

Conditional

05

I

LSC

NT

04

I

I
D3

NLS

I

D2

MLS

Symbol

I

HLS

D1

I

QLS

DO

I

NSD

I

Description

DO

NSD

NO SIGNAL DETECT: Indicates that the Signal Detect pin (TTLSD) has been
deasserted and that the Clock Recovery Device is not receiving data from the
Fiber Optic Receiver.

D1

QLS

QUIET LINE STATE: Received a minimum of eight consecutive Quiet symbol
pairs (00000 00000).

D2

HLS

HALT LINE STATE: Received a minimum of eight consecutive Halt symbol
pairs (00100 00100).

D3

MLS

MASTER LINE STATE: Received a minimum of eight consecutive Halt-Quiet
symbol pairs (00100 00000).

D4

NLS

NOISE LINE STATE: Detected a minimum of sixteen noise events.

D5

NT

NOISE THRESHOLD: This bit is set to 1 when the internal Noise Counter
reaches O. It will remain set until a value equal to or greater than one is
loaded into the Noise Threshold Register or Noise Prescale Threshold
Register.
During the reset process (i.e. RST = GND), since the Noise Counter is
initialized to 0, the Noise Threshold bit will be set to 1.

D6

LSC

LINE STATE CHANGE: A line state change has been detected.

D7

LSUPI

LINE STATE UNKNOWN & PHY INVALID: The Receiver Block has not
detected the minimum conditions to enter a known line state.
In addition, the most recently known line state was one of the following line
states: No Signal Detect, Quiet Line State, Halt Line State, Master Line State,
or Noise Line State.

2-69

Lt)
Lt)

C'I
C")

co
a..
Q

"....
Lt)

C'I
C")

co
a..
Q

5.0 Registers (Continued)
RECEIVE CONDITION REGISTER B (RCRB)
The Receive Condition Register B maintains a historical record of the Line States recognized by the Receiver Block.
When a new Line State is entered, the bit corresponding to that line state is set to 1. The bits corresponding to the previous Line
States are not clear by the PLAYER device, thereby maintaining a record of the Line States detected.
The-Receive Condition B bit (RCB) of the Interrupt Condition Register (ICR) will be set to 1 when one or more bits within the
Receive Condition Register B is set to 1 and the corresponding mask bits in Receive Condition Mask Register B (RCMRB) is
also set to 1.
ACCESS RULES
ADDRESS

I
07

I

READ

I

OAh

RES

Bit

Always

06

I

SILS

WRITE

I

Conditional

05

I

EBOU

04

I

CSE

I
03

I

02

LSUPV

Symbol

I

ALS

01

I

ST

DO

I

ILS

I

Description

DO

ILS

IDLE LINE STATE: Received a minimum of two consecutive Idle symbol
pairs (11111 11111).

D1

ST

STATE THRESHOLD: This bit will be set to 1 by the PLAYER device when
the internal State Counter reaches zero. It will remain set until a value equal
to or greater than one is loaded into the State Threshold Register or State
Prescale Threshold Register, and this register is cleared.
During the reset process (I.e. RST = GND), since the State Counter is
initialized to 0, the State Threshold bit is set to 1.

D2

ALS

ACTIVE LINE STATE: Received a JK symbol pair (1100010001), and
possibly data symbols following.

D3

LSUPV

LINE STATE UNKNOWN & PHY VALID: Receiver Block has not detected
the minimum conditions to enter a know line state when the most recently
known line state was one of the following line states: Active Line State or Idle
Line State

D4

CSE

CASCADE SYNCHRONIZATION ERROR: When a synchronization error
occurs, the Cascade Synchronization Error bit is set to 1.
A synchronization error occurs if the Cascade Start signal (CS) is not asserted
within approximately 80 ns of Cascade Ready (CR) release.

D5

EBOU

ELASTICITY BUFFER UNDERFLOWIOVERFLOW: The Elasticity Buffer
has either overflowed or underflowed. The Elasticity Buffer will automatically
recover if the condition which caused the error is only transient.

D6

SILS

SUPER IDLE LINE STATE: Received a minimum of eight Idle symbol pairs
(11111 11111).

D7

RES

RESERVED: Reserved for future use. The reserved bit is set to 0 during the
reset process.
Note: Users are discouraged from uSin~ this bit. It may be set or cleared without any
effects to the functionality of the PLAY R device.

2-70

5.0 Registers (Continued)
RECEIVE CONDITION MASK REGISTER A (RCMRA)
The Receive Condition Mask Register A allows the user to dynamically select which events will generate an interrupt.
The Receive Condition A bit (RCA) of the Interrupt Condition Register (lCR) will be set to 1 when one or more bits within the
Receive Condition Register A (RCRA) is set to 1 and the corresponding mask bites) in this register is also set to 1.
Since this register is cleared (i.e. set to 0) during the reset process, all interrupts are initially masked.
ACCESS RULES
ADDRESS

I

I

OSh

07

I

READ

LSUPIM

Bit

Always

06

I

WRITE

I

05

LSCM

I

NTM

04

I

I

Always

03

NLSM

I

02

MLSM

Symbol

I

HLSM

01

I

QLSM

DO

I

NSOM

I

Description

00

NSOM

NO SIGNAL DETECT MASK: The mask bit for the No Signal Oetect bit (NSO)
of the Receive Condition Register A (RCRA).

01

QLSM

QUIET LINE STATE MASK: The mask bit for the Quiet Line State bit (QLS) of
the Receive Condition Register A (RCRA).

02

HLSM

HALT LINE STATE MASK: The mask bit for the Halt Line State bit (HLS) of
the Receive Condition Register A (RCRA).

03

MLSM

MASTER LINE STATE MASK: The mask bit for the Master Line State bit
(MLS) of the Receive Condition Register A (RCRA).

04

NLSM

NOISE LINE STATE MASK: The mask bit for the Noise Line State bit (NLS)
of the Receive Condition Register A (RCRA)

05

NTM

NOISE THRESHOLD MASK: The mask bit for the Noise Threshold bit (Nn of
the Receive Condition Register A (RCRA).

06

LSCM

LINE STATE CHANGE MASK: The mask bit for the Line State Change bit
(LSC) of the Receive Condition Register A (RCRA).

07

LSUPIM

LINE STATE UNKNOWN & PHY INVALID MASK: The mask bit for the line
State Unknown & PHY Invalid bit (LSUPI) of the Receive Condition Register A
(RCRA).

2-71

It)
It)

~
co

a.
Q

.....
....

It)

N

('I)

co

a.
Q

5.0 Registers (Continued)
RECEIVE CONDITION MASK REGISTER B (RCMRB)
The Receive Condition Mask Register B allows the user to dynamically select which events will generate an interrupt.
The Receiver"ConditionB bit (RCB) of the Interrupt Condition Register (ICR) will be set to 1 when one or more bits within the
Receive Condition B (RCRA) is set to 1 and the corresponding mask bits in this register is also set to 1.
Since this register is cleared (i.e. set to 0) during the reset process, all interrupts are initially masked.
ACCESS RULES
ADDRESS

I
07

I

RES

Bit

READ

I

OCh

Always

06

I

SILSM

WRITE

I

05

I

EBOUM

Always

04

I

I
03

CSEM

I

02

LSUPVM

Symbol

I

ALSM

DO

01

I

STM

I

ILSM

I

Description

DO

ILSM

IDLE LINE STATE MASK: The mask bitforthe Idle Line State bit (ILS) of the
Receive Condition Register B (RCRB).

01

STM

STATE THRESHOLD MASK: The mask bit of the StateThreshold bit (Sn of
the Receive Condition Register B (RCRB).

02

ALSM

ACTIVE LINE STATE MASK: The mask bit for the Active Line State bit (ALS)
"of the Receive Condition Register B (RCRB).

03

LSUPVM

LINE STATE UNKNOWN & PHY VALID MASK: The mask bitfor the Line
State Unknown & PHY Valid bit (LSUPV) of the Receive Condition Register B
(RCRB).

04

CSEM

CASCADE SYNCHRONIZATION ERROR MASK: The mask bit for the
Cascade Synchronization Error bit (CSE) of the Receive Condition Register B
(RCRB)."

05

EBOUM

ELASTICITY BUFFER OVERFLOWIUNDERFLOW MASK: The mask bit for
the ElasticitY Buffer Overflow/Underflow bit (EBOU) of the Receive Condition
Register B (RCRB).

06

SILSM

SUPER IDLE LINE STATE MASK: The mask bitfor the Super Idle Line State
bit (SILS) of the Receive Condition Register B (RCRB).

07

RESM

RESERVED MASK: The mask bit for the Reserved bit (RES) of the Receive
Condition Register B (RCRB).

2·72

c

~

5.0 Registers (Continued)

~

NOISE THRESHOLD REGISTER (NTR)
The Noise Threshold Register contains the start value for the Noise Counter. This counter may be used in conjunction with the
Noise Prescale Counter for counting the Noise events. Definiton of Noise event is explained in detail in Section B.2. The Noise
Counter decrements once every BO ns if the noise Prescale counter is zero and there is a noise event. As a result, the internal
noise counter takes
((NPTR+ 1) x (NTR+1)) x BO ns

.........C

."
CO

Co)
II.)

en
en

to reach zero in the event of continuous Noise event.
The threshold values for the Noise Counter and Noise Prescale Counter are simultaneously loaded into both counters if one of
the following conditions is true:
(1) Both the Noise Counter and Noise Prescale Counter reach zero and the current Line State is either Noise Line State, Active
Line State, or Line State Unknown.
or
(2) The current Line State is either Halt Line State, Idle Line State, Master Line State, Quiet Line State, or No Signal Detect
or
(3) The Noise Threshold Register or Noise Prescale Threshold Register goes through a Control Bus Interface write cycle.
In addition, the value of the Noise Prescale Threshold register is loaded into the Noise Prescale Counter if the Noise Prescale
Counter reaches zero.
The Noise Counter and Noise Prescale Counter will continue to count, without resetting or reloading the threshold values, if a
Line State change occurs and the new line state is either Noise Line State, Active Line State or Line State Unknown.
When both the Noise Threshold Counter and Noise Counter both reach zero, the Noise Threshold bit of the Receive Condition
Register A will be set.
ACCESS RULES
ADDRESS

I
D7

I

READ

I

ODh

NT?

Bit

Always

D6

I

NT6

WRITE

I

D5

I

NT5

Always

D4

I

I
D3

NT4

I

D1

D2

NT3

Symbol

I

NT2

I

NT1

DO

I

NTO

I

Description

DO

NTO

NOISE THRESHOLD BIT: Least significant bit (LSB) of the start value
for the Noise Counter.

D1-5

NT1-5

NOISE THRESHOLD BIT < 1-5>: Intermediate bits of start value for the
Noise Counter.

D6

NT6

NOISE THRESHOLD BIT <6>: Most significant bit (MSB) of the start value
for the Noise Counter.

D7

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. Write data is ignored since the reserved
bit is permanently set to O.

fII

2·73

U)
U)

N

('f)

CD

a.
C
......
....
U)

N

('f)

~

C

r---------------------------------------------------------------------------------.
5.0 Registers (Continued)
NOISE PRESCALE THRESHOLD REGISTER (NPTR)
The Noise Prescale Threshold Register contains the start value for the· Noise Prescale Counter. The Noise Prescale Counter is a
count-down counter and it is used in conjunction with the Noise Counter for counting the Noise events. The Noise Pre scale
Counter decrements once every 80 ns while there is a noise event. When the Noise Prescale Counter reaches zero, it reloads
the count with the content of the Noise Prescale Threshold Register and also causes the Noise Counter to decrement.
The threshold values for the Noise Counter and Noise Prescale Counter are simultaneously loaded into both counters if one of
the following conditions is true:
(1) Both the Noise Counter and Noise Prescale Counter reach zero and the current Line State is either Noise Line State, Active
Line State, or Line State Unknown.
or
(2) The current Line State is either, Halt Line State, Idle Line State, Master Line State, Quiet Line State, or No Signal Detect
or
(3) The Noise Threshold Register or Noise Prescale Threshold Register goes through a Control Bus Interface write cycle.
In addition, the value of the Noise Prescale Threshold register is loaded into the Noise Prescale Counter if the Noise Prescale
Counter reaches zero.
The Noise Counter and Noise Prescale Counter will continue to count, without resetting or reloading the threshold values, if a
Line State change occurs and the new line state is either Noise Line State, Active Line State, or Line State Unknown.
When both the Noise Threshold Counter and Noise Counter both reach zero, the Noise Threshold bit of the Receive Condition
Register A will be set.
ACCESS RULES
ADDRESS

I
D7

I

NPT7

Bit
DO

01-6
07

READ

I

OEh

Always

D6

I

NPT6

WRITE

I

D5

I

NPT5

Always
D4

I

I
D3

NPT4

I

D2

NPT3

I

Symbol
NPTO
NPTI-6
NPT7

NPT2

D1

I

NPT1

DO

I

NPTO

I

Description
NOISE PRESCALE THRESHOLD BIT < 0>: Least significant bit (LSB) of the
start value of the Noise Prescale Counter.
NOISE PRESCALE THRESHOLD BIT: Intermediate bits of start
value for the Noise Prescale Counter.
NOISE PRESCALE THRESHOLD BIT < 7>: Most significant bit (MSB) of the
start value for the Noise Prescale Counter.

2-74

o

;g

5.0 Registers (Continued)

Co)

N
U1

CURRENT NOISE COUNT REGISTER (CNCR)
The Current Noise Count Register takes a snap-shot of the Noise Counter during every Control Bus Interface read-cycle of this
register.
During a Control Bus Interface write-cycle to the Current Noise Count Register, the PLAYER device will set the Control Bus
Write Command Reject bit (CCR) of the Interrupt Condition Register (ICR) to 1 and will ignore a write-cycle.

ACCESS RULES
ADDRESS

I
07

I

NCLSCD

Bit

READ

I

OFh

I

I

Write Reject

05

CNC6

I

co
Co)

N
U1
U1

WRITE

Always

06

....
o
"."

CNC5

03

04

I

CNC4

I

I

02

CNC3

Symbol

I

CNC2

01

I

CNC1

DO

I

CNCO

I

Description

DO-6

CNCO-6

CURRENT NOISE COUNT BIT <0-6>

D7

NCLSCD

NOISE COUNTER LINE STATE CHANGE DETECTION

•
2-75

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,
U)

C'I

Cf)

~

Q
.....
....

~
Cf)
co

a.
Q

5.0 Registers (Continued)
CURRENT NOISE PRESCALE COUNT REGISTER (CNPCR)
The Current Noise Prescale Count Register takes a snap-shot of the Noise Prescale Counter during every Control Bus Interface
read-cycle of this register.
During a Control Bus Interface write-cycle to the Current Noise Prescale Count Register, the PLAYER device will set the Control
Bus Write Command Reject bit (CCR) of the Interrupt Condition Register (ICR) to 1 and will ignore a write-cycle.

ACCESS RULES
ADDRESS
10h

D7

I

READ

WRITE

Always

Write Reject

D6

CNPC7

Bit
00-7

I

D5

CNPC6

I
I

I

CNPC5

Symbol
CNPCO-7

D4

I

D3

CNPC4

I
I

I

D1

D2

CNPC3

I

CNPC2

I

CNPC1

DO

I

CNPCO

Description
CURRENT NOISE PRESCALE COUNT BY <0-7>

2-76

I

C

5.0 Registers

"U

m
Co)

(Continued)

N
CI1

STATE THRESHOLD REGISTER (STR)
The State Threshold Register contains the start value of the State Counter. This counter is used in conjunction with the State
Prescale Counter to count the Line State duration. The State Counter will decrement every 80 ns if the State Prescale Counter is
zero and the current Line State is Halt Line, Idle Line State, Master Line State, Quiet Line State, or No Signal Detect. State The
State Counter takes
«SPTR+ 1) x (STR+ 1» x 80 ns
to reach zero during a continuous line state condition.
The threshold values for the State Counter and State Prescale Counter are simultaneously loaded into both counters if one of
the following conditions is true:
(1) Both the State Counter and State Prescale Counter reach zero and the current Line State is Halt Line State, Idle Line State,
Master Line State, Quiet Line State, or No Signal Detect
or
(2) A line state change occurs and the new Line State is Halt Line State, Idle Line State, Master Line State, Quiet Line State, or
No Signal Detect
or
(3) The State Threshold Register or State Prescale Threshold Register goes through a Control Bus Interface write cycle.
In addition, the value of the State Prescale Threshold register is loaded into the State Prescale Counter if the State Prescale
Counter reaches zero.
The State Counter and State Prescale Counter will reset by reloading the threshold values, if a Line State change occurs and the
new Line State is Halt Line State, Idle Line State, Master Line State, Quiet Line State, or No Signal Detect.

ACCESS RULES
ADDRESS

I
D7

I

READ

I

11h

ST7

Bit
DO

Always

D6

I

ST6

WRITE

I

D5

I

ST5

Always

D4

I

I
D3

ST4

I

D2

ST3

I

D1

I

ST1

DO

I

STO

I

Description

Symbol
STO

ST2

STATE THRESHOLD BIT <0>: Least significant bit (LSB) of the start value
for the State Counter.

01-5

ST1-5

STATE THRESHOLD BIT < 1-5>: Intermediate bits of start value for the
State Counter.

06

ST6

STATE THRESHOLD BIT < 6 >: Most significant bit (MSB) of the start value
for the State Counter.

07

RES

RESERVED: Reserved for future use.
Note: Users are discouraged from using this bit. Write data is ignored since the reserved

bit is permanently set to O.

2·77

....
.....
C

"U

m
Co)

N
CI1
CI1

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,
U)

~
co

5.0 Registers

(Continued)

a.

STATE PRESCALE THRESHOLD REGISTER (SPTR)

U)

The State Prescale Threshold Register contains the start value for the State Prescale Counter. The State Prescale Counter is a
down counter. The Register is used in conjunction with the State Counter to count the Line State duration.

c
.....
..C'oI

C")

co

a.
C

The State Prescale Counter will decrement every 80 ns if the current Line State is Halt Line, Idle Line State, Master Line State,
Quiet Line State, or No Signal Detect. As a result, the State Prescale Counter takes SPTR x 80 ns to reach zero during a
continuous line state condition. When the State Prescale Counter reaches zero, the State Prescale Threshold Register will be
reloaded into the State Prescale Counter.
The threshold values for the State Counter and State Prescale Counter are simultaneously loaded into both counters if one of
the following conditions is true:
(1) Both the State Counter and State Prescale Counter reach zero and the current Line State is Halt Line State, Idle Line State,
Master Line State, Quiet Line State, or No Signal Detect.
or
(2) A Line State change occurs and the new Line State is Halt Line State, Idle Line State, Master Line State, Quiet Line State, or
No Signal Detect
or
(3) The State Threshold Register or State Prescale Threshold Register goes through a Control Bus Interface write cycle.
The State Counter and State Prescale Counter will reset by reloading the threshold values, if a Line State change occurs and the
new Line State is Halt Line State, Idle Line State, Master Line State, Quiet Line State, or No Signal Detec.t.
ACCESS RULES
ADDRESS

I
D7

I

SPT7

Bit

Always

D6

I

WRITE

READ

I

12h

SPT6

I
D4

D5

I

SPT5

Always

I

I
D2

D3

SPT4

I

SPT3

I

Symbol

SPT2

D1

I

SPT1

DO

I

SPTO

I

Description

DO

SPTO

STATE PRESCALE THRESHOLD BIT <0>: Least significant bit (LSB) of
the start value for the State Prescale Counter.

01-6

SPT1-6

STATE PRESCALE THRESHOLD BIT < 1"'6>: Intermediate bits of start
value for the State Prescale Counter.

07

SPT7

STATE PRESCALE THRESHOLD BIT < 7 >: Most significant bit (MSB) of
the start value for the State Prescale Counter.

2-78

.----------------------------------------------------------------------.0
5.0 Registers

"'U

co
Co)

(Continued)

N
U'I

CURRENT STATE COUNT REGISTER (CSCR)
The Current State Count Register takes a snap-shot of the State Counter during every Control Bus Interface read-cycle of this
register.
During a Control Bus Interface write-cycle to the Current State Count Register, the PLAYER device will set the Control Bus Write
Command Reject bit (CCR) of the Interrupt Condition Register (ICR) to 1 and will ignore a write-cycle.
ACCESS RULES
ADDRESS

I
07

I

Bit

I

CSC6

I

Always

06

SCLSCD

Write Reject

04

05

I

,

WRITE

READ

I

13h

CSC5

I

CSC4

I
03

I

02

CSC3

Symbol

I

CSC2

01

I

CSCI

DO

I

CSCO

I

Description

< 0-6 >

DO-6

CSCO-6

CURRENT STATE COUNT BIT

D7

SCLSCD

STATE COUNTER LINE STATE CHANGE DETECTION

2-79

....
.....
o"'U
co
Co)

N
U'I
U'I

5.0 Registers (Continued)
CURRENT STATE PRESCALE COUNT REGISTER (CSPCR)
The Current State Prescale Count Register takes a snap-shot of the State Prescale Counter during every Control Bus interface
read-cycle of this register.
During a Control Bus Interface write-cycle to the Current State Prescale Count Register, the PLAYER device will set the Control
Bus Write Command Reject bit (CCR) of the Interrupt Condition Register (lCR) to 1 and will ignore a write-cycle.
ACCESS RULES
ADDRESS

I
D7

READ

I

14h

Always

D6

I CSPC7 I
Bit
00-7

CSPC6

WRITE

I

D5

I
I
I

CSPC5

I

Write Reject
D3

D4

I

CSPC4

Symbol
CSPCO-7

I

D2

CSPC3

I
I

I

CSPC2

D1

I

DO

CSPC1

I

CSPCO

I

Description
CURRENT STATE PRESCALE COUNT <0-7>

2-80

C

""0

5.0 Registers

(XI
Co)

(Continued)

...
N

LINK ERROR THRESHOLD REGISTER (LETR)

U1

The Link Error Threshold Register contains the start value for the Link Error Monitor Counter, which is an 8-bit down-counter that
decrements if link errors are detected.
When the Counter reaches 0, the Link Error Monitor Threshold Register value is loaded into the Link Error Monitor Counter and
the Link Error Monitor Threshold bit (LEMT) of the Interrupt Condition Register (ICR) is set to 1.
The Link Error Monitor Threshold Register value is also loaded into the Link Error Monitor Counter during every Control Bus
Interface write-cycle of LETR.

C

""0
(XI
Co)

N

U1

U1

The Counter is initialized to 0 during the reset process (i.e. RST = GND).
ACCESS RULES
ADDRESS

I
07

I

READ

I

15h

LET7

Bit

06

I

LET6

WRITE

I

Always

D5

I

LET5

Always

D4

I

I
D3

LET4

I

D1

D2

LET3

Symbol

I

LET2

I

LET1

DO

I

LETO

I

Description

DO

LETO

LINK ERROR THRESHOLD BIT <0>: Least significant bit of the start value
for the Link Error Monitor Counter.

D1-6

LET1-6

LINK ERROR THRESHOLD BIT < 1-6>: Intermediate bits of start value for
the Link Error Monitor Counter.

D7

LET7

LINK ERROR THRESHOLD BIT <7>: Most significant bit of the start value
for the Link Error Monitor Counter.

FJI

2-81

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,
U)

N

('I)

~
Q

.....
....
U)

~

~

Q

5.0 Registers (Continued)
CURRENT LINK ERROR COUNT REGISTER (CLECR)
The Current Link Error Count Register takes a snap-shot of the Link Error Monitor Counter during every Control Bus Interface
read-cycle of this register.
During a Control Bus Interface write-cycle, the PLAYER device will set the Control Bus Write Command Reject bit (CCR) of the
Interrupt Condition Register (lCR) to 1 and will ignore a write-cycle.
ACCESS RULES
ADDRESS

I
D7

I

LEC7

READ

I

16h

Always

D6

I
Bit
00-7

LEC6

WRITE

I

Write Reject

D5

I

LEC5

I
I

D4

I

LEC4

I
D2

D3

I

LEC3

I
I
I

Symbol
LECO-7

2-82

LEC2

D1

I

LEC1

DO

I

LECO

I

Description
LINK ERROR COUNT BIT <0-7>

C

5.0 Registers

'a
00

(Continued)

Co)

USER DEFINABLE REGISTER (UDR)
The User Definable Register is used to monitor and control events which are external to the PLAYER device.
The value of the Sense Bits reflects the asserted/deasserted state of their corresponding Sense pins. On the other hand, the
Enable bits assert/ deassert the Enable pins.

I

READ

I

17h
D7
RES

Bit

Always

D6

I

....
.....
C

'a
00
Co)

N

ACCESS RULES
ADDRESS

I

N

c.n

RES

I

D5

I

RES

c.n
c.n

WRITE
Always
D4

I

RES

I
D3

I

D2

EB1

Symbol

I

EBO

DO

D1

I

SB1

I

SBO

I

Description

DO

SBO

SENSE BIT 0: This bit is set to 1 if the Sense Pin 0 (SPO) is asserted (i.e. SPO = Vee! for a minimum of
160 ns. Once the asserted signal is latched, Sense Bit 0 can only be cleared through the Control Bus
Interface, even if the signal is deasserted. This ensures that the Control Bus Interface will record the
source of events which can cause interrupts in a traceable manner.

D1

SB1

SENSE BIT 1: This bit is set to 1 if the Sense Pin 1 (SP1) is asserted (i.e. SP1 = Vee! for a minimum of
160 ns. Once the asserted signal is latched, Sense Bit 1 can only be cleared through the Control Bus
Interface, even if the signal is deasserted. This ensures that the Control Bus Interface will record the
source of events which can cause interrupts in a traceable manner.

D2

EBO

ENABLE BIT 0: The Enable Bit 0 allows control of external logic through the Control Bus Interface. The
User Definable Enable Pin 0 (EPO) is asserted/deasserted by this bit.
0: EPO is deasserted (i.e. EPO = GND).
1: EPO is asserted (i.e. EPO = Vee).

D3

EB1

ENABLE BIT 1: This bit allows control of external logic through the Control Bus Interface. The User
Definable Enable Pin 0 (EPO) is asserted/deasserted by this bit.
0: EP1 is deasserted (i.e. EP1 = GND).
1: EP1 is asserted (i.e. EP1 = Vee!.

D4-7

RES

RESERVED: Reserved for future use. The reserved bit is set to 0 during the initialization process
(i.e. RST = GND).
Nole: Users are discouraged from using this bit. It may be set or cleared without any effects to the functionality of the
PLAYER device.

II

2-83

~
~

~

CIO
~

......
~

~

~

C

,---------------------------------------------------------------------------------,
5.0 Registers (Continued)
DEVICE ID REGISTER (IDR)

The Device 10 Register contains the binary equivalent of the revision number for this device. It can be used to ensure proper
software and hardware versions are matched.
During the Control Bus Interface write-cycle, the PLAYER device will set the Control Bus Write Command Register bit (CCR) of
the Interrupt Condition Register (ICR) to 1, and will ignore write-cycle.
ACCESS RULES
ADDRESS

I

I

18h
D7

I

READ

0107

Bit

Always

D6

I

0106

WRITE

I

Write Reject

D5

I

0105

D4

I

I
D3

0104

I

D2

0103

I

Symbol

0102

DO

D1

I

0101

I

DIDO

I

Description

DO

DIDO

DEVICE ID BIT <0>: Least significant bit (LSB) of the revision number.

01-6

0101-6

DEVICE ID BIT

07

0107

DEVICE ID BIT

< 1-0-6>: Intermediate bits of the revision number.
<7>: Most significant bit (MSB) of the revision number.

2-84

,----------------------------------------------------------------------, C
"'til
co
5.0 Registers (Continued)
(0)
N

CURRENT INJECTION COUNT REGISTER (CIJCR)

....
.....
C
;g
(II

The Current Injection Count Register takes a snap-shot of the Injection Counter during every Control Bus Interface read-cycle of
this register.
During a Control Bus Interface write-cycle, the PLAYER device will set the Control Bus Write Command Reject bit (CCR) of the
Interrupt Condition Register (lCR) to 1 and will ignore a write-cycle.
The Injection Counter is an 8-bit down-counter which decrements every 80 ns.

(0)

N

(II
(II

The counter is active only during One Shot or Periodic Injection Modes (i.e. Injection Control <1:0> bits (IC<1:0» of the
Current Transmit State Register (CTSR) are set to either 01 or 10).
The Injection Threshold Register (IJTR) value is loaded into the Injection Counter when the counter reaches zero and during
every Control Bus Interface write-cycle of IJTR.
The counter is initialized to
ACCESS RULES
ADDRESS

I
07

I

IJC7

Bit

Always

06

I

IJC6

I

Write Reject

05

I

IJC5

GND).

WRITE

READ

I

19h

a during the reset process (i.e. RST =

04

I

I
03

IJC4

I

02

IJC3

Symbol

I

IJC2

01

I

IJC1

DO

I

IJCO

I

Description

DO

IJCO

INJECTION COUNT BIT <0>: least significant bit (lSB) of the current value
of the Injection Counter.

D1-6

IJC1-6

INJECTION COUNT BIT < 1-6>: Intermediate bits representing the current
value of the Injection Counter.

D7

IJC7

INJECTION COUNT BIT <7>: Most significant bit (MSB) of the current
value of the Injection Counter.

II

2-85

5.0 Registers (Continued)
INTERRUPT CONDITION COMPARISON REGISTER (ICCR)
The Interrupt Condition Comparison Register ensures that the Control Bus must first read a bit modified by the PLAYER device
before it can be written to by the Control Bus Interlace.
The current state of the Interrupt Condition Register (ICR) is automatically written into the Interrupt Condition Comparison
Register (i.e. ICCR = ICR) during a Control Bus Interface read-cycle of ICA.
During a Control Bus Interlace write-cycle, the PLAYER device will set the Conditional Write Inhibit bit (CWI) of the Interrupt
Condition Register (ICR) to 1 and disallow the setting or clearing of a bit within ICR when the value of a bit in ICR differs from the
value of the corresponding bit in the Interrupt Condition Comparison Register.
ACCESS RULES
ADDRESS

I

07

I

UDIC

Bit

READ

I

1Ah

06

I

RCBC

WRITE

I

Always

05

I

RCAC

Always

04

I

I
03

LEMTC

I

02

CWIC

Symbol

I

CCRC

01

I

CPEC

DO

I

DPEC

I

Description

DO

DPEC

PHY-REQUEST DATA PARITY ERROR COMPARISON: The comparison
bit for the PHY_Request Data Parity Error bit (OPE) of the Interrupt Condition
Register (lCR).

D1

CPEC

CONTROL BUS DATA PARITY ERROR COMPARISON: The comparison bit
for the Control Bus Data Parity Error bit (CPE) of the Interrupt Condition
Register (ICR).

02

CCRC

CONTROL BUS WRITE COMMAND REJECT COMPARISON: The
comparison bit for the Control Bus Write Command Reject bit (CCR) of the
Interrupt Condition Register (ICR).

D3

CWIC

CONDITIONAL WRITE INHIBIT COMPARISON: The comparison bit for the
Conditional Write Inhibit bit (CWI) of the Interrupt Condition Register (lCR).

04

LEMTC

LINK ERROR MONITOR THRESHOLD COMPARISON: The comparison bit
for the Link Error Monitor Threshold bit (LEMn of the Interrupt Condition
Register (lCR).

05

RCAC

RECEIVE CONDITION A COMPARISON: The comparison bit for the
Receive Condition A bit (RCA) of the Interrupt Condition Register (ICR).

06

RCBC

RECEIVE CONDITION B COMPARISON.: The comparison bit for the
Receive Condition B bit (RCB) of the Interrupt Condition Register (lCR).

07

UDIC

USER DEFINABLE INTERRUPT COMPARISON: The comparison bit for the
User Definable Interrupt bit (UDIC) of the Interrupt Condition Register (lCR).

2-86

5.0 Registers (Continued)
CURRENT TRANSMIT STATE COMPARISON REGISTER (CTSCR)
The Current Transmit State Comparison Register ensures that the Control Bus must first read a bit modified by the PLAYER
device before it can be written to by the Control Bus Interface.
The current state of the Current Transmit State Register (CTSR) is automatically written into the Current Transmit State
Comparison Register A (i.e. CTSCR = CTSR) during a Control Bus Interface read-cycle of CTSR.
During a Control Bus Interface write-cycle, the PLAYER device will set the Conditional Write Inhibit bit (CWI) of the Interrupt
Condition Register (lCR) to 1 and disallow the setting or clearing of a bit within the CTSR when the value of a bit in the CTSR
differs from the value of the corresponding bit in the Current Transmit State Comparison Register.
ACCESS RULES
ADDRESS

I

I

Bit

Always

06

07
RESC

READ

I

1Bh

I

WRITE

I

05

PROPEC

I

SEC

Always

04

I

IC1C

I
02

03

I

ICOC

I

TM2C

01

I

TM1C

DO

I

TMOC

I

Description

Symbol

DO

TMOC

TRANSMIT MODE <0> COMPARISON: The comparison bitfor the
Transmit Mode < 0 > (TMO) of the Current Transmit State Register (CTSR).

D1

TM1C

TRANSMIT MODE < 1 > COMPARISON: The comparison bit for the
Transmit Mode < 1 > bit (TM1) of the Current Transmit State Register
(CTSR).

D2

TM2C

TRANSMIT MODE < 2> COMPARISON: The comparison bit for the
Transmit Mode < 2 > bit (TM2) of the Current Transmit State Register
(CTSR).

D3

ICOC

INJECTION CONTROL <0> COMPARISON: The comparison bit for the
Injection Control <0> bit (I CO) of the Current Transmit State Register
(CTSR).

04

IC1C

INJECTION CONTROL < 1 > COMPARISON: The comparison bit for the
Injection Control < 1 > bit (IC1) of the Current Transmit Register (CTSR).

05

SEC

SMOOTHER ENABLE COMPARISON: The comparison bit for the Smoother
Enable bit (SE) to the Current Transmit State Register (CTSR).

06

PROPEC

PHY_REQUEST DATA PARITY ENABLE COMPARISON: The comparison
bit for the PHY_Request Data Parity Enable bit (PROPE) of the Current
Transmit State Register (CTSR).

07

RESC

RESERVED COMPARISON: The comparison bit for the Reserved bit (RES)
of the Current Transmit State Register (CTSR).

•
I

2-87

5.0 Registers (Continued)
RECEIVE CONDITION COMPARISON REGISTER A (RCCRA)
The Receive Condition Comparison Register A ensures that the Control Bus must first read a bit modified by the PLAYER device
before it can be written to by the Control Bus Interface.
The current state of RCRA is automatically written into the Receive Condition Comparison Register A (i.e. RCCRA = RCRA)
during a Control Bus Interface read-cycle of RCRA.
During a Control Bus Interface write-cycle, the PLAYER device will set the Conditional Write Inhibit bit (CWll of the Interrupt
Condition Register (lCR) to 1 and prevent the setting or clearing of a bit within RCRA when the value of.a bit in RCRA differs
from the value of the corresponding bit in the Receive Condition Comparison Register A.
ACCESS RULES
ADDRESS

I

I

D7

I

READ

1Ch

LSUPIC

D6

I

LSCC

WRITE

I

Always
D5

I

D4

NTC

I

I

Always

NLSC

I

D1

D2

D3
MLSC

I

HLSC

I

QLSC

DO

I

NSDC

I

Bit

Symbol

DO

NSDC

NO SIGNAL DETECT COMPARISON: The comparison bit for the No Signal Detect bit
(NSDl of the Receive Condition Register A (RCRA).

Description

D1

QLSC

QUIET LINE STATE COMPARISON: The comparison bit for the Quiet Line State bit
(QLS) of the Receive Condition Register A (RCRAl.

D2

HLSC

HALT LINE STATE COMPARISON: The comparison bit for the Halt Line State bit (HLSl
of the Receive Condition Register A (RCRA).

D3

MLSC

MASTER LINE STATE COMPARISON: The comparison bit for the Master Line State bit
(MLSl of the Receive Condition Register A (RCRA).

04

NLSC

NOISE LINE STATE COMPARISON: The comparison bit for the Noise Line State bit
(NLS) of the Receive Condition Register A (RCRA).

D5

NTC

NOISE THRESHOLD COMPARISON: The comparison bit for the Noise Threshold bit
(NT) of the Receive Condition Register A (RCRAl.

06

LSCC

LINE STATE CHANGE COMPARISON: The comparison bit for the Line State Change
bit (LSC) of the Receive Condition Register A (RCRA).

07

LSUPIC

LINE STATE UNKNOWN" PHY INVALID COMPARISON: The comparison bit for the
Line State Unknown & PHY Invalid bit (LSUPI) of the Receive Condition Register A
(RCRA).

2-88

5.0 Registers

(Continued)

RECEIVE CONDITION COMPARISON REGISTER B (RCCRB)
The Receive Condition Comparison Register B ensures that the Control Bus must first read a bit modified by the PLAYER device
before it can be written to by the Control Bus Interface.
The current state of RCRB is automatically written into the Receive Condition Comparison Register B (i.e. RCCRB = RCRB)
during a Control Bus Interface read-cycle RCRB.
During a Control Bus Interface write-cycle, the PLAYER device will set the Conditional Write Inhibit bit (CWI) of the Interrupt
Condition Register (ICR) to 1 and prevent the setting or clearing of a bit within RCRB when the value of a bit in RCRB differs
from the value of the corresponding bit in the Receive Condition Comparison Register B.
ACCESS RULES
ADDRESS

I

06

07

I

I

1Dh

RESC

READ

I

SILSC

WRITE

I

Always

05

I

I

Always

04

EBOUC

I

CSEC

02

03

I

LSUPVC

I

ALSC

DO

01

I

STC

I

ILSC

I

Bit

Symbol

DO

ILSC

IDLE LINE STATE COMPARISON: The comparison bit for the Idle State bit (ILS) of the
Receive Condition Register B (RCRB).

Description

D1

STC

STATE THRESHOLD COMPARISON: The comparison bit for the State Threshold bit
(ST) of the Receive Condition Register B (RCRB).

D2

ALSC

ACTIVE LINE STATE COMPARISON: The comparison bit for the Active Line State bit
(ALS) of the Receive Condition Register B (RCRB).

D3

LSUPVC

LINE STATE UNKNOWN 8. PHY VALID COMPARISON: The comparison bit for the Line
State Unknown & PHY Valid bit (LSUPV) of the Receive Condition Register B (RCRB).

D4

CSEC

CASCADE SYNCHRONIZATION ERROR COMPARISON: The comparison bit for the
Cascade Synchronization Error bit (CSE) of the Receive Condition Register B (RCRB).

D5

EBOUC

ELASTICITY BUFFER OVERFLOWIUNDERFLOW COMPARISON: The comparison bit
for the Elasticity Buffer Overflow/Underflow bit (EBOU) of the Receive Condition
Register B (RCRB).

D6

SILSC

SUPER IDLE LINE STATE COMPARISON: The comparison bit for the Super Idle Line
State bit (SILS) of the Receive Condition Register B (RCRB).

D7

RESC

RESERVED COMPARISON: The comparison bit for the Reserved bit (RES) of the
Receive Condition Register B (RCRB).

RESERVED REGISTER 0 (RRO) ADDRESS 1Eh-DO NOT USE
RESERVED REGISTER 1 (RR1) ADDRESS 1Fh-DO NOT USE

2-89

It)
It)

N

CW)

co

11.

Q

....
'"

It)

N

CW)

co

11.

Q

6.0 Pin Descriptions
6.1 DP83251
The pin descriptions for the DP83251 are divided into 5 functional interfaces: Serial Interface, PHY Port Interface, Control Bus
Interface, Clock Interface, and Miscellaneous Interface.
For a Pinout Summary List, refer to Table 6-1.
..,
..,
....
:;: c
0
0
c
'"0 0 0 0 0 0 i5 c0 "
"

e;

f!;

...en
u

...

en
u

en
u

...

>" uen

en
u

z

'"

...

en

u

en
u

z

'"

en
u

en
u

...... ...uen ......uen

>" uen

en

u

...
en
u

I~

iNT
CE

GND

12

PE

13

SPO

14

SP1

15

RST

74

0

73
72

R/W

AlP

16

BRP

Ale

17

BRC

AID7

18

BRD7

AID6

19

BROS

GND

20

AID5

21

Vee

22

AID4

23

DP83251
PLAYER
84-PIN PLCC

GND
BRD5

Vee
BRD4

GND

24

AID3

25

BRD3

AID2

26

BRD2

AID1

27

BRD1

AIDO

28

CS

29

GND

BRDO
57

LBC

CR

30

N/C

31

55

N/C

N/c

32

54

N/C

TXE

0

u

0

CIl

t=

en

;;:l

+

I

U

u

'"

'"

><

><

" ~
+
>u

I

0

><

0

z

'" '" '"

+

0

en

..J

...
I

0

..J

!:l +

>

~

l-

I

0

~

0

z

'"

+

u

><

I-

I

u

><

l-

Order Number DP83251V
See NS Package Number V84A
FIGURE 6-1. DP83251 84-Pln PLCC Pinout

2-90

<> +
u
>" ...

I-

I

...u

I-

~
TL/F/10388-20

6.0 Pin Descriptions (Continued)
TABLE 6-1. DP83251 Pinout Summary
Pin No.

Signal Name

Symbol

I/O

Eel/TTL/Open
Drain/Power

1

Control Bus Data < 2 >

CBD2

1/0

TTL

2

Control Bus Data < 3 >

CBD3

1/0

TTL

3

CMOS 1/0 Ground

GND

4

Control Bus Data < 4 >

CBD4

1/0

5

Control Bus Data < 5 >

CBD5

1/0

6

CMOS 1/0 Power

Vee

7

Control Bus Data <6>

CBD6

1/0

TTL

8

Control Bus Data < 7 >

CBD7

1/0

TTL

9

Control Bus Data Parity

CBP

1/0

TTL

10

Enable Pin 0

EPO

0

TTL

11

Enable Pin 1

EP1

0

TTL

+OV
TTL
TTL
+5V

12

CMOS Logic Ground

GND

13

Control Bus Data Parity Enable

CBPE

I

TTL

14

Sense Pin 0

SPO

I

TTL

15

Sense Pin 1

SP1

I

TTL

16

PHY Port A Indicate Parity

AlP

0

TTL

17

PHY Port A Indicate Control

AIC

0

TTL

18

PHY PortA Indicate Data<7>

AID7

0

TTL

19

PHY Port A Indicate Data < 6 >

AID6

0

20

CMOS 1/0 Ground

GND

+OV

TTL
+OV

0

21

PHY Port A Indicate Data < 5 >

AID5

22

CMOS 110 Power

Vee

TTL

23

PHY PortA Indicate Data<4>

AID4

24

CMOS Logic Ground

GND

25

PHY PortA Indicate Data<3>

AID3

0

26

PHY Port A Indicate Data < 2 >

AID2

0

TTL

27

PHY Port A Indicate Data < 1 >

AID1

0

TTL

+5V

0

TTL
+OV
TTL

28

PHY PortA Indicate Data

AIDO

0

TTL

29

Cascade Start

CS

0

TTL

30

Cascade Ready

CR

I

Open Drain

31

No Connect

N/C

I

TTL

32

No Connect

N/C

33

Clock Detect

CD

34

Signal Detect

TTLSD

I

TTL

35

External Loopback Enable

ELB

0

TTL

2-91

fI

6.0 Pin Descriptions (Continued)
TABLE 6·1. DP83251 Pinout Summary (Continued)
Pin No.

Signal Name

Symbol

I/O

Eel/TTL/Open
Drain/Power
ECl

36

Receive Bit Clock +

RXC+

I

37

Receive Bit Clock -

RXC-

I

38

ECl logic Power

Vee

39

Receive Data +

RXD+

I
I

ECl
+5V
ECl

40

Receive Data -

RXD-

41

ECl logic Ground

GND

42

Extemal loopback Data +

lBD+

0

ECl

43

Extemal loopback Data -

lBD-

0

ECl

44

ECl 1/0 Power

Vee

45

Transmit Data+

TXD+

0

46

Transmit Data+

TXD-

0

47

ECl logic Ground

GND

48

Transmit Bit Clock +

TXC+

I

49

Transmit Bit Clock -

TXC-

I

50

ECl logic Power

Vee

ECl
+OV

+5V
ECl
ECl
+OV
ECl
ECl
+5V

51

Transmit Byte Clock +

TBC+

I

ECl

52

Transmit Byte Clock -

TBC-

I

ECl

53

FOTX Enable level

TEL

I

TTL

54

No Connect

N/C

55

No Connect

N/C

56

FOTXEnable

TXE

0

TTL

57

local Byte Clock

lBC

I

TTL

58

PHY Port B Request Data < 0>

BRDO

I

TTL

59

PHY Port B Request Data < 1 >

BRD1

I

TTL

60

PHY Port B Request Data <2>

BRD2

I

TTL

61

PHY Port B Request Data < 3 >

BRD3

I

TTL

62

CMOS logic Ground

GND

63

PHY Port B Request Data <4>

BRD4

64

CMOS 110 Power

Vee

65

PHY Port B Request Data < 5>

BRD5

66

CMOS 110 Ground

GND

67

PHY Port B Request Data <6>

BRD6

I

TTL

68

PHY Port B Request Data < 7>

BRD7

I

TTL

69

PHY Port B Request Control

BRC

I

TTL

70

PHY Port B Request Parity

BRP

0

TTL

2·92

+OV

I

TTL
+5V

I

TTL
+OV

c

;g

6.0 Pin Descriptions (Continued)

Co)

N
CII

TABLE 6-1. DP83251 Pinout Summary (Continued)

Pin No.

Signal Name

Symbol

I/O

Eel/TTL/Open
Drain/Power

71

- PLAYER Device Reset

RSf

I

TTL

72

Read/- Write

R/W

I

TTL

73

Chip Enable

CE

I

TTL

74

-Interrupt

INT

0

Open Drain

75

- Acknowledge

ACK

0

Open Drain

76

Control Bus Address

CBAO

I

TTL

77

Control Bus Address < 1 >

CBA1

I

TTL

78

Control Bus Address < 2>

CBA2

I

TTL

79

Control Bus Address < 3 >

CBA3

I

TTL

I

80

Control Bus Address<4>

CBA4

81

CMOS Logic Power

Vee

82

Control Bus Data <0>

CBDO

I/O

83

Control Bus Data < 1 >

CBD1

I/O

84

CMOS Logic Ground

GND

.....
.....
C

"'U

co
~
CII
CII

TTL
+5V
TTL
TTL
+OV

fII

2·93

6.0 Pin Descriptions (Continued)
SERIAL INTERFACE
The Serial Interface consists of I/O signals used to connect the PLAYER device to the Physical Medium Dependent (PMD)
sublayer.
The PLAYER device uses these signals to interface to a Fiber Optic Transmitter (FOTX), Fiber Optic Receiver (FOXR), Clock
Recovery Device (CRD device), and Clock Distribution Device (CDD device).
Symbol

Pin No.

I/O

Description

CD

33

I

Clock Detect: A TIL input signal from the Clock Recovery Device indicating that the
Receive Clock (RXC ±) is properly synchronized with the Receive Data RXD ±).

TIlSD

34

I

Signal Detect: A TIL signal from the clock Recovery Device indicating that a signal is
being received by the Fiber Optic Receiver.

RXD+
RXD-

39
40

I

Receive Data: Differentiai lOOK ECl, 125 Mbps serial data input signals from the Clock
Recovery Device.

TXD+
TXD-

45
46

0

Transmit Data: Differential, lOOK ECl, 125 Mbps serial data output Signals to the Fiber
Optic Transmitter.

ElB

35

0

External Loopback Enable: A TIL output signal to the Clock Recovery Device which
enables/disables loopback data through the Clock Recovery Device. This signal is
controlled by the Mode Register.

lBD+
lBD-

42
43

0

Loopback Data: Differential, lOOK ECl, 125 Mbps, external serialloopback data output
. signals to the Clock Recovery Device.
When the PLAYER device is not in externalloopback mode, the lBD+ signal is kept
high and the lBD- signal is kept low.

TEL

53

I

FOTX Enable Level: A TIL input signal to select the Fiber Optic Transmitter Enable
(TXE) signal level.

TXE

56

0

FOTX Enable: A TIL output signal to enable/disable the Fiber Optic Transmitter. The
output level of the TXE pin is determined by three parameters, the Transmit Enable (TE)
bit in the Mode Register, the TM2-TMO bits in the Current Transmit State Register, and
also the input to the TEL pin.
The following rules summarizes the output of the TXE pin:
(1) liTE = and TEL = GND,thenTXE = Vee
(2) liTE = 0 and TEL = Vee, then TXE = GND
(3) liTE = 1 and OTM and TEL = GND, then TXE = Vee
(4) liTE = 1 and OTM and TEL = Vee, then TXE = GND
(5) liTE = 1 and not OTM and TEL = GND, then TXE = GND
(6) liTE = 1 and not OTM and TEL = Vee, then TXE = Vee

o

2-94

C

"tI

co

6.0 Pin Descriptions (Continued)

(0)

N
U1

PHY PORT INTERFACE

.....

The PHY Port Interface consists of I/O signals used to connect the PLAYER Device to the Media Access Control (MAC)
sublayer or other PLAYER Devices. The DP63251 Device has one PHY Port Interface which consists of the B_Request and the
A-Indicate paths.

......

Each path consists of an odd parity bit, a control bit, and two 4-bit symbols.

N
U1
U1

Refer to Section 3.3, the Configuration Switch, for further information.
Description

Pin No.

1/0

AlP

16

a

PHY Port A Indicate Parity: A TTL output signal representing odd parity for the 10-bit
wide Port A Indicate signals (AlP, AIC, and AID<7:0».

AIC

17

a

PHY Port A Indicate Control: A TTL output signal indicating that the two 4-bit symbols
(AID<7:4> and AID<3:0» are either control symbols (AIC = 1) or data symbols (Ale
= 0).

AID7
AID6
AIDS
AID4

16
19
21
23

a

PHY Port A Indicate Data: TTL output signals representing the first 4-bit data/control
symbol.

AID3
AID2
AIDI
AIDO

25
26
27
26

a

BRP

70

I

PHY Port B Request Parity: A TTL input signal representing odd parity for the 10-bit
wide Port A Request signals (BRP, BRC, and BRD<7:0».

BRC

69

I

PHY Port B Request Control: A TTL input signal indicating that the two 4-bit symbols
(BRD<7:4» and BRD<3:0» are either control symbols (BRC = 1) or data symbols
(BRC = 0).

BRD7
BRD6
BRD5
BRD4

66
67
65
63

I

PHY Port B Request Data: TTL input signals representing the first 4 bit data/control
symbol.

BRD3
BRD2
BRD1
BRDO

61
60
59
56

I

Symbol

AID7 is the most significant bit and AID4 is the least significant bit of the first symbol.
PHY Port A Indicate Data: TTL output signals representing the second 4-bit datal
control symbol.
AID3 is the most significant bit and AIDO is the least significant bit of the second symbol.

BRD7 is the most significant bit and BRD4 is the least significant bit of the first symbol.
PHY Port B Request Data: TTL input signals representing the second 4-bit datal control
symbol.
BRD3 is the most significant bit and BRDO is the least significant bit of the second
symbol.

2-95

C

"tI

co

(0)

6.0 Pin Descriptions (Continued)
CONTROL BUS INTERFACE
The Control Bus Interface consists of I/O signals used to connect the PLAYER device to Station Management (SMn.
The Control Bus is an asynchronous interface between the PLAYER device and a general purpose microprocessor. It provides
access to 32 8-bit internal registers.
Refer to Figure 22, Control Bus Timing Diagram, for more information.
Symbol

Pin No.

I/O

Description

CE

73

I

Chip Enable: An active-low, TTL, input signal which enables the Control Bus port for a read
or write cycle. R/W, CBA<4:0>, CBP, and CBD<7:0> must be valid at the time -eE is low.

R/W

72

I

Read/-Write: A TTL input signal which indicates a read Control Bus cycle (R/W = 1), or
a write Control Bus cycle (R/W = 0). This signal must be valid when -eE is low and held
valid until ACK becomes low.

ACK

75

0

- Acknowledge: An active low, TTL, open drain output signal which indicates the
completion of a read or write cycle.
During a read cycle, CBD<7:0> are valid as long as ACK is low (ACK = 0).
During a write cycle, a microprocessor must hold CBD<7:0> valid until ACK becomes low.
Once ACK is low, it will remain low as long as CE remains low (CE = 0).

INT

74

0

-Interrupt: An active low, open drain, TTL, output signal indicating that an interrupt
condition has occurred. The Interrupt Condition Register (ICR) should be read in order to
find out the source of the interrupt. Interrupts can be masked through the use of the
Interrupt Condition Mask Register (ICMR).

CBA4
CBA3
CBA2
CBA1
CBAO

80
79
78
77
76

I

Control Bus Address: TTL input signals used to select the address of the register to be
read or written.
CBA4 is the most significant bit (MSB), CBAO is the least significant bit (LSB) of the address
signals.
These signals must be valid when
is low and held valid until ACK becomes low.

CBPE

13

I

CBP

9

I/O

Control Bus Parity: A bidirectional, TTL signal representing odd parity for the Control Bus
data (CBD < 7:0 > ).
During a read cycle, the signal is held valid by the PLAYER device as long as ACK is low.
During a write cycle, the signal must be valid when CE is low, and must be held valid until '
ACK becomes low. If incorrect parity is used during a write cycle, the PLAYER device will
inhibit the write cycle and set the Control Bus Data Parity Error (CPE) bit in the Interrupt
Condition Register (lCR).

CBD7
CBD6
CBD5

8
7
5

I/O

CBD4
CBD3
CBD2
CBD1
CBDO

4
2
1
83
82

Control Bus Data: Bidirectional, TTL signals containing the data to be read from or written
to a register.
During a read cycle, the signal is held valid by the PLAYER device as long as ACK is low.
During a write cycle, the signal must be valid when CE is low, and must be held valid until
ACK becomes low.

a:

Control Bus Parity Enable: A TTL input signal which, during write cycles, will enable or
disable the Control Bus parity checker. Note that the Control Bus will always generate
parity during read cycles, regardless of the state of this signal.

2-96

6.0 Pin Descriptions (Continued)
CLOCK INTERFACE
The Clock Interface consists of 12.5 MHz and 125 MHz clocks used by the PLAYER device. The clocks are generated by either
the Clock Distribution Device or Clock Recovery Device.
Symbol

PlnNo.

1/0

LBC

57

I

Local Byte Clock: A TTL, 12.5 MHz, 50% duty cycle, input clock from the Clock
Distribution Device. The Local Byte Clock is used by the PLAYER device's internal
CMOS logic and to latch incoming/outgoing data of the Control Bus Interface, Port A
Interface, Port B Interface, and other miscellaneous lias.

Description

RXC+
RXC-

36
37

I

Receive Bit Clock: Differential 1OOk ECL, 125 MHz clock input signals from the Clock
Recovery Device. The Receive Bit Clock is used by the Serial Interface to latch the
Receive Data (RXD ±).

TXC+
TXC-

48
49

I

Transmit Bit Clock: Differential 1OOk ECL, 125 MHz clock input signals from the Clock
Distribution Device. The Transmit Bit Clock is used by the Serial Interface to latch the
Transmit Data (TXD ±).

TBC+
TBC-

51
52

I

Transmit Byte Clock: Differental1 OOk ECL, 12.5 MHz clock input signals from the Clock
Distribution Device. The Transmit Byte Clock is used by the PLAYER device's internal
Shift Register Block.

2·97

II)
II)

IN

Cf)

co

a.
Q

.....
....

II)

6.0 Pin Descriptions (Continued)
MISCELLANOUS INTERFACE
The Miscellaneous Interface' consists of a reset signal, user definable sense signals, user definable enable signals, Cascaded
PLAYER devices synchronization signals, ground signals, and power signals.

IN

Cf)

Pin No.

I/O

Description

RST

71

I

Reset: An active low, TTL, input signal which clears all registers. The signal
must be kept asserted for a minimum of 160 ns.
Once the RSi' signal is asserted, the PLAYER device should be allowed 960
ns to reset internal logic. Note that bit zero of the Mode Register will be set to
zero (i.e. Stop Mode). See Section 4.2, Stop Mode of Operation for more
information.

SPO

14

I

User Definable Sense Pin 0: A TTL input signal from a user defined source.
Bit zero (Sense Bit 0) of the User Definable Register (UDR) will be set to one
if the signal is asserted for a minimum of 160 ns.
Once the asserted signal is latched, Sense Bit 0 can only be cleared through
the Control Bus Interface, even if the signal is deasserted. This ensures that
, the Control Bus Interface will record the source of events which can cause
interrupts.

Symbol

co

a.
Q

,

SPI

15

I

User Definable Sense Pin 1: A TTL input signal from a user defined source.
Bit one (Sense Bit 1) of the User Definable Register (UDR) will be set to one if
the signal is asserted for a minimum of 160 ns.
Once the asserted signal is latched, Sense Bit 1 can only be cleared through
the Control Bus Interface, even if the signal is deasserted. This ensures that
the Control Bus Interface will record the source of events which can cause
interrupts.

EPO

10

0

User Definable Enable Pin 0: A TTL output signal allowing control of
external logic through the CBUS Interface. EPO is asserted/deasserted
through bit two (Enable Bit 0) of the User Definable Register (UDR). When
Enable Bit 0 is set to zero, EPO is deasserted. When Enable Bit 0 is set to
one, EPO is asserted.

EPI

11

0

User Definable Enable Pin 1: A TTL output signal allowing control of
external logic through the CBUS Interface. EPI is asserted/deasserted
through bit two (Enable Bit 1) of the User Definable Register (UDR). When
Enable Bit 1 is set to zero, EPI is deasserted. When Enable Bit 1 is set to
one, EPI is asserted.

CS

29

I

Cascade Start: A TTL input signal used to synchronize cascaded PLAYER
devices in pOint-to-point applications.
The signal is asserted when all of the cascaded PLAYER devices have the
Cascade Mode (CM) bit of Mode Register (MR) set to one, and all of the
Cascade Ready pins of the cascaded PLAYER devices have been released.
For further information, refer to Section 4.4, Cascade Mode of Operation.

CR

30

0

Cascade Ready: An Open Drain output signal used to synchronize cascaded
PLAYER devices in point-to-point applications.
The signal is released (i.e. an Open Drain line is released) when all the
cascaded PLAYER devices have the Cascade Mode (CM) bit of the Mode
Register (MR) set to one and a JK symbol pair has been received.
For further information, refer to Section 4.4, Cascade Mode of Operation.

2-98

C

"tI

6.0 Pin Descriptions (Continued)

CD

Co)

N

POWER AND GROUND
All power pins should be connected to a single 5V power supply. All ground pins should be connected to a common OV supply.

U1
.....
.....

Symbol

"tI

PinNo.

I/O

Description

C

CD

Co)

GND

3

Ground: Power supply return for Control Bus Interface CMOS I/Os.

Vee

6

Power: Positive 5V power supply (±5% relative to ground) for Control Bus Interface
CMOSI/Os.

GND

12

Ground: Power supply return for internal CMOS logic.

GND

20

Ground: Power supply return for Port A Interface CMOS I/0s.

Vee

22

Power: Positive 5V power supply (± 5% relative to ground) for the Port A Interface
CMOS I/Os.

GND

24

Ground: Power supply return to internal CMOS logic.

Vee

38

Power: Positive 5V power supply (± 5% relative to ground) for internal ECl logic.

GND

41

Ground: Power supply return for internal ECl logic.

Vee

44

Power: Positive 5V power supply (± 5% relative to ground) for the Serial Interface ECl II
Os.

GND

47

Ground: Power supply return for internal ECl logic.

Vee

50

Power: Positive 5V power supply (± 5% relative to ground) for the Serial Interface ECl II
Os.

GND

62

Ground: Power supply return for internal CMOS logic.

Vee

64

Power: Positive 5V power supply (± 5% relative to ground) for the Port A Interface
CMOS I/Os.
Ground: Power supply return for Port A Interface CMOS I/0s.

GND

66

Vee

81

Power: Positive 5V power supply (± 5% relative to ground) for internal CMOS logic.

GND

84

Ground: Power supply return for internal CMOS logic.

NO CONNECT PINS
Symbol

N/C
N/C
N/C
N/C

Pin No.

Description

I/O

31

No Connect: Not used by the PLAYER device

32

No Connect: Not used by the PLAYER device

54

No Connect: Not used by the PLAYER device

55

No Connect: Not used by the PLAYER device

2-99

N

U1
U1

U)
U)

C'I

CO)

r---------------------------------------------------------------------------------,
6.0 Pin Descriptions (Continued)

~

6.2 DP83255

.-

The pin descriptions for the DP83255 are divided into six functional interfaces; Serial Interface, PHY Port Interface, Control Bus
Interface, Clock Interface, and Miscellaneous Interface.

c......
~
CO)

~

For a Pinout Summary List; refer to Table 6-2.

c

o

DP83255

PLAYER
132-PIN PQFP

TLlF/l0386-21

Order Number DP83255AVF
See NS Package Number VF132A
FIGURE 6-2. DP83255 132-Pln PQFP Pinout

2-100

c

;g

6.0 Pin Descriptions (Continued)

Co)

N
UI

TABLE 6-2. DP83255 Pinout Summary

Pin No.

Signal Name

Symbol

1

CMOS Logic Ground

GND

1/0

Eel/TTl/Open
DralnlPower
+OV

2

Control Bus Data<2>

CBD2

1/0

3

Control Bus Data<3>

CBD3

1/0

4

CMOS 1/0 Ground

GND

5

Control Bus Data<4>

CBD4

1/0

TTL

6

Control Bus Data < 5 >

CBD5

1/0

TTL

7

CMOS 1/0 Power

Vee

8

Control Bus Data<6>

CBD6

1/0

TTL

9

Control Bus Data<7>

CBD7

1/0

TTL

10

Control Bus Data Parity

CBP

1/0

TTL

TTL

+5V

Enable Pin 0

EPO

0

TTL

Enable Pin 1

EP1

0

TTL

13

No Connect

14

No Connect

15

No Connect

16

No Connect

N/C
N/C
N/C
N/C
N/C
N/C
N/C

No Connect
No Connect

19

No Connect

20

CMOS Logic Ground

GND

21

Control Bus Data Parity Enable

CBPE

I

TTL

22

Sense Pin 0

SPO

I

TTL

23

Sense Pin 1

SP1

I

TTL

24

PHY Port A Indicate Parity

AlP

0

TTL

25

PHY Port A Request Parity

ARP

I

TTL

26

PHY Port A Indicate Control

AIC

0

TTL

27

PHY Port A Request Control

ARC

I

TTL

28

PHY Port A Indicate Data <7>

AID7

0

TTL

+OV

29

PHY PortA Request Data<7>

ARD7

I

TTL

30

PHY PortA Indicate Data<6>

AID6

0

TTL

31

PHY Port A Request Data <6>

ARD6

I

32

CMOS 1/0 Ground

GND

33

PHY A Indicate Data<5>

AID5

0

34

PHY A Request Data<5>

ARD5

I

35

CMOS 1/0 Power

Vee

2-101

~

UI
UI

TTL

11

18

C

;g

+OV

12

17

....
.....

TTL
+OV
TTL
TTL
+5V

fII

6.0 Pin Descriptions (Continued)
TABLE 6-2. DP83255 Pinout Summary (Continued)
Pin No.

Signal Name

Symbol

I/O

Eel/TTL/Open
Drain/Power
TTL

PHY A Indicate Data<4>

AID4

0

37

PHY A Request Data<4>

ARD4

I

38

CMOS logic Ground

GND

39

PHY Port A Indicate Data < 3 >

AID3

0

TTL

40

PHY Port A Request Data < 3 >

ARD3

I

TTL

41

PHY Port A Indicate Data <2>

AID2

0

TTL

42

PHY Port A Request Data <2>

ARD2

I

TTL

43

PHY Port A Indicate Data < 1 >

AID1

0

TTL

44

PHY Port A Request Data < 1 >

ARD1

I

TTL

45

PHY Port A Indicate Data < 0 >

AIDO

0

TTL

46

Port A Request Data < 0 >

ARDO

I

TTL

47

Cascade Start

CS

I

TTL

48

Cascade Ready

CR

0

Open Drain

36

TTL
+OV

56

No Connect

N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C

57

Clock Detect

CD

I

TTL

58

Signal Detect

TTlSD

I

TTL

59

External loopback Enable

ElB

0

TTL

60

Receive Bit Clock +

RXC+

I

ECl

61

Receive Bit Clock -

RXC-

I

62

ECl logic Power

Vee

63

Receive Data +

RXD+

I

64

Receive Data -

RXD-

I

65

ECl logic Ground

GND

49

No Connect

50

No Connect

51

No Connect

52

No Connect

53

No Connect

54

No Connect

55

No Connect

ECl
+5V
ECl
ECl
+OV

66

External loopback Data +

lBD+

0

67

External loopback Data -

lBD-

0

68

ECl I/O Power

Vee

69

Transmit Data +

TXD+

0

ECl

70

Transmit Data -

TXD-

0

ECl

2-102

ECl
ECl
+5V

Ie
"'U

6.0 Pin Descriptions (Continued)

Q)
Co)

N

TABLE 6-2. DP83255 Pinout Summary (Continued)

Pin No.

Signal Name

Symbol

110

71

ECl logic Ground

GND

72

Transmit Bit Clock +

TXC+

I

ECl

73

Transmit Bit Clock -

TXC-

I

ECl

+OV

74

ECl logic Power

Vee

75

Transmit Byte Clock +

TBC+

I

ECl

76

Transmit Byte Clock -

TBC-

I

ECl

77

FOTX Enable level

TEL

I

TTL

78

No Connect

N/C

79

No Connect

80

No Connect

85

No Connect

86

FOTXEnable

TXE

0

TTL

87

local Byte Clock

LBC

I

TTL

88

PHY Port B Indicate Data <0>

BIDO

0

TTL

89

PHY Port B Request Data <0>

BRDO

I

TTL

90

PHY Port B Indicate Data < 1 >

BID1

0

TTL

81

No Connect
No Connect

83

No Connect

84

No Connect

91

PHY Port B Request Data < 1 >

BRD1

I

TTL

92

PHY Port B Indicate Data<2>

BID2

0

TTL

93

PHY Port B Request Data < 2 >

BRD2

I

TTL

94

PHY Port B Indicate Data<3>

BID3

0

TTL

95

PHY Port B Request Data <3>

BRD3

I

TTL

96

CMOS Logic Ground

GND

97

PHY Port B Indicate Data <4>

BID4

0

98

PHY Port B Request Data <4>

BRD4

I

99

CMOS I/O Power

Vee

100

PHY Port B Indicate Data

BIDS

0

"'U
Q)
Co)

N

en
en

I

+OV
TTL
TTL
+SV
TTL

101

PHY Port B Request Data 

BROS

102

CMOS I/O Ground

GND

103

PHY Port B Indicate Data < 6 >

BID6

0

TTL

104

PHY Port B Request Data <6>

BRD6

I

TTL

10S

PHY Port B Indicate Data<7>

BID7

0

TTL

2-103

Ie

+5V

N/C
N/C
N/C
N/C
N/C
N/C
N/C

82

....
.....
en

Eel/TTL/Open
Drain/Power

TTL
+OV

•

6.0 Pin Descriptions (Continued)
TABLE 6·2. DP83255 Pinout Summary (Continued)
Eel/TTL/Open
Drain/Power

Pin No.

Signal Name

106

PHY Port B Request Data<7>

BRD7

I

TTL

107

PHY Port B Indicate Control

BIC

a

TTL

108

PHY Port B Request Control

BRC

I

TTL

109

PHY Port B Indicate Parity

BIP

a

TTL

110

PHY Port B Request Parity

BRP

I

TTL

111

- PLAYER Device Reset

RSf

I

TTL

112

Read/-Write

R/W

I

TTL

113

Chip Enable

~

I

TTL

114

-Interrupt

a

Open Drain

115

No Connect

116

No Connect

117

No Connect

118

No Connect

119

No Connect

120

No Connect

Symbol

I/O

121

No Connect

122

No Connect

iN'f
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C

123

- Acknowledge

~

a

Open Drain

124

Control Bus Address <0>

CBAO

I

TTL

125

Control Bus Address < 1>

CBA1

I

TTL

126

Control Bus Address <2>

CBA2

I

TTL

127

Control Bus Address <3 >

CBA3

I

TTL

128

Control Bus Address < 4>

CBA4

I

129

CMOS Logic Power

Vee

130

Control Bus Data <0 >

CBDO

110

TTL

131

Control Bus Data < 1 >

CBD1

110

TTL

132

CMOS Logic Ground

GND

2-104

TTL
+5V

+OV

C

-a

6.0 Pin Descriptions (Continued)

C»

w

SERIAL INTERFACE

N
U1

The Serial Interface consists of I/O signals used to connect the PLAYER device to the Physical Medium Dependent (PM D)
sublayer.

C

The PLAYER device uses these signals to interface to a Fiber Optic Transmitter (FOTX), Fiber Optic Receiver (FORX), Clock
Recovery Device (CRD device), and Clock Distribution Device (CDD device).
PlnNo.

1/0

CD

57

I

Clock Detect: A TTL input signal from the Clock Recovery Device indicating that the
Receive Clock (RXC ±) is properly synchronized with the Receive Data (RXD ±).

TTlSD

58

I

Signal Detect: A TTL input signal from the Clock Recovery Device indicating that a
signal is being received by the Fiber Optic Receiver.

RXD+
RXD-

63
64

I

Receive Data: Differential lOOK ECl, 125 Mbps serial data input signals from the Clock
Recovery Device.

TXD+
TXD-

69
70

0

Transmit Data: Differential, lOOK ECl, 125 Mbps serial data output signals to the Fiber
Optic Transmitter.

ElB

59

0

External Loopback Enable: A TTL output signal to the Clock Recovery Device which
enables/disables loopback data through the Clock Recovery Device. This signal is
controlled by the Mode Register.

lBD+
lBD-

66
67

0

Loopback Data: Differential, lOOK ECl, 125 Mbps, serial externalloopback data output
signals to the Clock Recovery Device.

Symbol

......
.......
-a
C»

w

N
U1
U1

Description

When the PLAYER device is not in externalloopback mode, the lBD+ signal is kept
high and the lBD- signal is kept low.
TEL

77

I

TXE

86

0

FOTX Enable Level: A TTL input signal to select the Fiber Optic Transmitter Enable
(TXE) signal level.
FOTX Enable: A TTL output signal to enable/disable the Fiber Optic Transmitter. The
output level of the TXE pin is determined by three parameters, the Transmit Enable (TE)
bit in the Mode Register, the TM2-TMO bits in the Current Transmit State Register, and
also the input to the TEL pin.
The following rules summarizes the output of the TXE pin:
(1) If TE = 0 and TEL = GND, then TXE = Vee
(2) If TE = 0 and TEL = Vee, then TXE = GND
(3) If TE = 1 and OTM and TEL = GND, then TXE = Vee
(4) If TE = 1 and OTM and TEL = Vee, then TXE = GND
(5) If TE = 1 and not OTM and TEL = GND, then TXE = GND
(6) If TE = 1 and not OTM and TEL = Vee, then TXE = Vee

•
2-105

6.0 Pin Descriptions (Continued)
PHY PORT INTERFACE
The PHY Port Interface consists of I/O signals used to connect the PLAYER Device to the Media Access'Control (MAC)
sublayer or other PLAYER Devices. The DP83255 Device has two PHY Port Interfaces. The LRequest and Llndicate paths
form one PHY Port Interface and the B_Request and B_lndicate paths form the second PHY Port Interface. Each path
consists of an odd parity bit, a control bit, and two 4-bit symbols.
Refer to Section 3.3, the Configuration Switch, for more information.
Symbol

Description

IIlnNo.

1/0

AlP

24

0

PHY Port A Indicate Parity: A TTL output signal representing odd parity for the 10-bit
wide Port A Indicate signals (AlP, AIC, and AID <7:0».

AIC

26

0

PHY Port A Indicate Control: A TTL output signal indicating that the two 4-bit symbols
(AID<7:4> and AID<3:0» are either control symbols (AIC = 1) or data symbols (AIC
= 0).

AID7
AID6
AID5
AID4

28
30
33
36

0

PHY Port A Indicate Data: TTL output signals representing the first 4-bit data/control
symbol.
AID7 is the most significant bit and AID4 is the least significant bit of the first symbol.

AID3
AID2
AIDI
AIDO

39
41
43
45

0

PHY Port A Indicate Data: TTL output signals representing the second 4-bit datal
control symbol.
AID3 is the most significant bit and AIDO is the least significant bit of the second symbol.

ARP

25

I

PHY Port A Request Parity: A TTL input signal representing odd parity for the 10-bit
wide PortA Request signals (ARP, ARC, and ARD<7:0».

ARC

27

I

PHY Port A Request Control: A TTL input signal indicating that the two 4-bit symbols
(ARD<7:4> and ARD<3:0» are either control symbols (ARC = 1) or data symbols
(ARC = 0).

ARD7
ARD6
ARD5
ARD4

29
31
34
37

I

PHY Port A Request Data: TTL input signals representing the first 4 bit datal control
symbol.
ARD7 isthe most significant bit and ARD4 is the least significant bit of the first symbol.

ARD3
ARD2
ARDI
ARDO

40
42
44
46

I

PHY Port A Request Data: TTL input signals representing the second 4-bit datal control
symbol.
ARD3 is the most significant bit and ARDO is the least significant bit of the second
symbol.

2-106

C

6.0 Pin Descriptions

"tI

co

(Continued)

Co)
I\)

U'I
.....
.....

PHY PORT INTERFACE (Continued)
Symbol
BIP

PlnNo.

1/0

109

0

Description
PHY Port B Indicate Parity: A TTL output signal representing odd parity for the 10-bit
wide Port B Indicate signals (BIP, BIC, and BID<7:0».

BIC

107

0

PHY Port B Indicate Control: A TTL output signal indicating that the two 4-bit symbols
(BID<7:4> and BID<3:0» are either control symbols (BIC = 1) or data symbols (BIC
= 0).

BID7
BID6
BIDS
BID4

105
103
100
97

0

PHY Port B Indicate Data: TTL output signals representing the first 4-bit datal control
symbol.

BID3
BID2
BIDl
BIDO

94
92
90
88

0

BRP

110

I

PHY Port B Request Parity: A TTL input signal representing odd parity for the 10-bit
wide Port B Request signals (BRP, BRC, and BRD<7:0».

BRC

108

I

PHY Port B Request Control: A TTL input signal indicating that the two 4-bit symbols
(BRD<7:4» and BRD<3:0» are either control symbols (BRC = 1) or data symbols
(BRC = 0).

BRD7
BRD6
BROS
BRD4

106
104
101
98

I

PHY Port B Request Data: TTL input signals representing the first 4-bit datal control
symbol.

BRD3
BRD2
BRDl
BRDO

95
93
91
89

I

C

"tI

co
Co)

I\)

U'I
U'I

BID7 is the most significant bit and BID4 is the least significant bit of the first symbol.
PHY Port B Indicate Data: TTL output signals representing the second 4-bit datal
control symbol.
BID3 is the most significant bit and BIDO is the least significant bit of the second symbol.

BRD7 is the most significant bit and BRD4 is the least significant bit of the first symbol.
PHY Port B Request Data: TTL input signals representing the second 4-bit datal control
symbol.
BRD3 is the most significant bit and BRDO is the least significant bit of the second
symbol.

•
2-107

II)
II)

C"I

C")

co

a.

C
.....
.....

~
co

a.

6.0 Pin Descriptions (Continued)
CONTROL BUS INTERFACE
The Control Bus Interface consists of 1/0 signals used to connect the PLAYER device to Station Management (SMn.
The Control Bus is an asynchronous interface between the PLAYER device and a general purpose microprocessor. It provides
access to 32 8-bit internal registers.
Refer to Figure 22, Control Bus Timing Diagram, for further information.

C

PlnNo.

1/0

Description

CE

113

I

Chip Enable: An active-low, TTL, input signal which enables the Control Bus port for a
read or write cycle. R/W, CBA <4:0>, CBP, and CBD<7:0> must be valid atthe time CE
is low.

R/W

112

I

Readl - Write: A TTL input signal which indicates a read Control Bus cycle (R/W = 1),
or a write Control Bus cycle (R/W = 0). This signal must be valid when CE: is iow and
held valid until ACK becomes low.

ACK

123

0

- Acknowledge: An active low, TTL, open drain output signal which indicates the
completion of a read or write cycle.
During a read cycle, CBD<7:0> are valid as long asACKis low (ACK = 0).
During a write cycle, a microprocessor must hold CBD<7:0> valid until ACK becomes
low.
Once ACK is low, it will remain low as long as CE remains low (CE = 0).

INT

114

0

-Interrupt: An active low, open drain, TTL, output signal indicating that an interrupt
condition has occurred. The Interrupt Condition Register (lCR) should be read in order to
determine the source of the interrupt. Interrupts can be masked through the use of the
Interrupt Condition Mask Register (ICMR)

CBA4
CBA3
CBA2
CBA1
CBAO

128
127
126
125
124

I

Control Bus Address: TTL input signals used to select the address of the register to be
read or written.
CBA4 is the most significant bit and CBAO is the least significant bit of the address
signals.
These signals must be valid when CE is low and held valid until ACK becomes low.

CBPE

21

I

Control B,us Parity Enable: A TTL input signal which, during write cycles, will enable or
disable the Control Bus parity checker. Note that the Control Bus will always generate
parity during read cycles, regardless of the state of this signal:

CBP

10

1/0

Control Bus Parity: A bidirectional, TTL signal representing odd parity for the Control
Bus data (CBD<7:0».
During a read cycle, the signal is held valid by the PLAYER device as long as ACK is low.
During a write cycle, the signal must be valid when CE is low, and must be held valid until
ACK becomes low. If incorrect parity is used during a write cycle, the PLAYER device will
inhibit the write cycle and set the Control Bus Data Parity Error (CPE) bit in the Interrupt
Condition Register (ICR).

CBD7
CBD6
CBD5
CBD4
CBD3
CBD2
CBD1
CBDO

9
8
6
5
3
2
131
130

1/0

Control Bus Data: Bidirectional, TTL signals containing the data to be read from or
written to a register.
During a read cycle, the signal is held valid by the PLAYER device as long as ACK is low.
During a write cycle, the signal must be valid when CE is low, and must be held valid until
ACK becomes low.

Symbol

2-108

6.0 Pin Descriptions (Continued)
CLOCK INTERFACE
The Clock Interface consists of 12.5 MHz and 125 MHz clocks used by the PLAYER device. The clocks are generated by either
the Clock Distribution Device or Clock Recovery Device.

PlnNo.

1/0

lBC

Symbol

87

I

Local Byte Clock: A TTL, 12.5 MHz, 50% duty cycle, input clock from the Clock
Distribution Device. The local Byte Clock is used by the PLAYER device's internal
CMOS logic and to latch incoming/outgoing data of the Control Bus Interface, Port A
Interface, Port B Interface, and other miscellaneous I/Os.

Description

RXC+
RXC-

60
61

I

Receive Bit Clock: Differential, lOOk ECl, 125 MHz clock input signals from the Clock
Recovery Device. The Receive Bit Clock is used by the Serial Interface to latch the
Receive Data (RXD ±).

TXC+
TXC-

72
73

I

Transmit Bit Clock: Differential, lOOk ECl, 125 MHz clock input signals from the Clock
. Distribution Device. The Transmit Bit Clock is used by the Serial Interface to latch the
Transmit Data (TXD ±).

TBC+
TBC-

75
76

I

Transmit Byte Clock: Differental, lOOk ECl, 12.5 MHz clock input signals from the
Clock Distribution Device. The Transmit Byte Clock is used by the PLAYER device's
internal Shift Register Block.

2·109

6.0 Pin Descriptions (Continued)
MISCELLANEOUS INTERFACE
The Miscellaneous Interface consists of a reset signal, user definable sense signals, user definable enable signals, Cascaded
PLAYER device's synchronization signals, ground signals, and power signals.
Pin No.

I/O

Description

RSi

111

I

' Reset: An active low, TIL, input signal which clears all registers. The signal must be kept
asserted for a minimum of 160 ns.
Orice the RST signal is asserted, the PLAYER device should be allowed 960 ns to reset
internal logic. Note that bit zero of the Mode Register will be set to zero (i.e. Stop Mode).
See Seqtion 4.2, Stop Mode of Operatjon for more information.

SPO

22-

I

User Definable Sense Pin 0: A TIL input signal from a user defined source. Bit zero
(Sense Bit 0) of the User Definable Registe(UDR) will be set to one if the signal is
asserted for a minimum of 160 ns.
Once the asserted signal is latched, Sense Bit 0 can only be cleared through the Control,
Bus Interface, even if the signal is deasserted. This ensures that the Control Bus
Interface will record the source of events which can cause interrupts.

SP1

23

I

User Definable Sense Pin 1: A TIL input signal from a user defined source. Bit one
(Sense Bit 1) of the User Definable Register (UDR) will be set to one if the signal is
asserted for a minimum of 160 ns.
Once the asserted signal is latched, Sense Bit 0 can only be cleared through the Control
Bus Interface, even if the signal is deasserted. This ensures that the Control Bus
Interface will record the source of events which can cause interrupts.

EPO

11

0

User Definable Enable Pin 0: A TIL output signal allowing control of external logic
through the Control Bus Interface. EPO is asserted/deasserted through bit two (Enable
Bit 0) of the User Definable Register (UDR). When Enable Bit 0 is set to zero, EPO is
deasserted. When Enable Bit 0 is set to one, EPO is asserted.

EP1

12

0

User Definable Enable Pin 1: A TIL output signal allowing control of external logic
through the Control Bus Interface. EP1 is asserted/deasserted through bit two (Enable
Bit 1) of the User Definable Register (UDR). When Enable Bit 1 is set to zero, EP1 is
deasserted. When Enable Bit 1 is set to one, EP1 is asserted.

CS

47

I

Cascade Start: A TIL input signal used to synchronize cascaded PLAYER devices in
pOint-to-point applications.
The signal is asserted when all of the cascaded PLAYER devices have the Cascade
Mode (CM) bit of the Mode Register (MR) set to one, and all of the Cascade Ready (CR)
pins ofthe cascaded PLAYER devices have been released.
For further information, refer to Section 4.4, Cascade Mode of Operation.

CR

48

0

Cascade Ready: An Open Drain output signal used to synchronize cascaded PLAYER
devices in point-to-point applications.
The signal is released when all the cascaded PLAYER devices have the Cascade Mode
(CM) bit of the Mode Register (MR) set to one and a JK symbol pair has been received.
For further Information, refer to section 4.4, Cascade Mode of Operation.

, Symbol

2-110

6.0 Pin Descriptions (Continued)
POWER AND GROUND
All power pins should be connected to a single 5V power supply. All ground pins should be connected to a common OV ground
supply.
Symbol

Pin No.

Description

I/O

GND

1

Ground: Power supply return for internal CMOS logic.

GND

4

Ground: Power supply return for Control Bus Interface CMOS I/0s.

Vee

7

Power: Positive 5V power supply (± 5% relative to ground) for Control Bus Interface
CMOSI/Os.

GND
GND

20

Ground: Power supply return for internal CMOS logic.

32

Ground: Power supply return for Port A Interface CMOS I/0s.

Vee

35

Power: Positive 5V power supply (± 5% relative to ground) for the Port A Interface
CMOSI/Os.

GND

38

Ground: Power supply return for internal CMOS logic.

Vee

62

Power: Positive 5V ppwer supply (± 5% relative to ground) for internal ECL logic.

GND

65

Ground: Power supply return for internal ECL logic.

Vee

68

Power: Positive 5V power supply (±5% relative to ground) for the Serial Interface ECL II
Os.
Ground: Power supply return for internal ECL logic.

GND

71

Vee

74

Power: Positive 5V power supply (± 5% relative to ground) for internal ECL logic.

GND

96

Ground: Power supply return for internal CMOS logic.

Vee

99

Power: Positive 5V power supply (± 5% relative to ground) for Port B Interface CMOS II
Os.

GND

102

Ground: Power supply return for Port B Interface CMOS 1/05.

Vee

129

Power: 5V power supply (± 5% relative to ground) for internal CMOS logic.

GND

132

Ground: Power supply return for internal CMOS logic.

2-111

Lt)

a

a.

C
.....
.,...
Lt)

N

C")

f
c

6.0 Pin Descriptions (Continued)
NO CONNECT PINS
Description

Symbol

Pin No•

N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C
N/C

I/O

13

No Connect: Not used by the PLAYEA device

14

No Connect: Not used by the PLAYEA device

15

No Connect: Not used by the PLAYEA device

16

No Connect: Not used by the PLAYEA device

17

No Connect: Not used by the PLAYEA device

18

No Connect: Not used by the PLAYEA device

19

No Connect: Not used by the PLAYEA device

49

No Connect: Not used by the PLAYEA device

50

No Connect: Not used by the PLAYEA device

51

No Connect: Not used by the PLAYEA device

52

No Connect: Not used by the PLAYEA device

53

No Connect: Not used by the PLAYEA device

54

No Connect: Not used by the PLAYEA device

55

No Connect: Not used by the PLAYEA device

56

No Connect: Not used by the PLAYEA device

78

No Connect: Not used by the PLAYEA device

79

No Connect: Not used by the PLAYEA device

80

No Connect: Not used by the PLAYEA device

81

No Connect: Not used by the PLAYEA device

82

No Connect: Not used by the PLAYEA device

83

No Connect: Not used by the PLAYEA device

84

No Connect: Not used by the PLAYEA device

85

No Connect: Not used by the PLAYEA device

115

No Connect: Not used by the PLAYEA device

116

No Connect: Not used by the PLAYEA device

117

No Connect: Not used by the PLAYEA device

118

No Connect: Not used by the PLAYEA device

119

No Connect: Not used by the PLAYEA device

120

No Connect: Not used by the PLAYEA device

121

No Connect: Not used by the PLAYEA device

122

No Connect: Not used by the PLAYER device

2-112

C

"'D

7.0 Electrical Characteristics

CD

Co)

N
UI

7.1 ABSOLUTE MAXIMUM RATINGS
Symbol
Vee

Parameter

Conditions

Supply Voltage

Min

Typ

-0.5

Max

Units

7.0

V

DCIN

Input Voltage

-0.5

Vee + 0.5

DCOUT

Output Voltage

-0.5

Vee + 0.5

V

Storage Temperature

-65

150

·C

V

....
.....
C

"'D
CD

Co)

N
UI
UI

7.2 RECOMMENDED OPERATING CONDITIONS
Symbol

Parameter

Vee

Supply Voltage

TA

Operating Temperature

Conditions

Min

Typ

Max

Units

4.75

5.25

V

0

70

·C

7.3 DC ELECTRICAL CHARACTERISTICS
The DC characteristics are over the operating range. unless otherwise specified.
DC electrical characteristics for the TIL. TRI-STATE output signals of PHY. Port Interfaces. and CBUS Interface.
Symbol

Parameter

Conditions

IOZ1

TRI-STATE Leakage
(CBP & CBD7 -0)

VOUT = Vee

IOZ2

TRI-STATE Leakage
(CBP & CBD7 -0)

VOUT = VGND

IOZ3

TRI-STATE Leakage
(AID & BID)

VOUT = Vee
(Note 1)

IOZ4

TRI-STATE Leakage
(AID&BID)

VOUT = GND

Min

Typ

Max

Units

10

/LA

-10

/LA

60

/LA

-500

/LA

Note 1: Output buffer has a p-channel pullup device.

DC electrical characteristics for all TIL input signals and the following TIL output signals: External Loopback (ELB). Fiber Optic
Transmitter Enable (TXE). Enable Pin 0 (EPO). and Enable Pin 1 (EP1).
Symbol

Parameter

Conditions

VOH

Output High Voltage

10H = -2mA

VOL

Output Low Voltage

10L = 4mA

VIH

Input High Voltage

VIL

Input Low Voltage

Vie

Input Clamp Voltage

liN = -18 mA

IlL

Input Low Current

IIH

Input High Current

Min

Typ

Max

Units

0.5

V

V

Vee - 0.5

2.0

V
0.8

V

-1.5

V

VIN = GND

-10

/LA

VIN = Vee

+10

/LA

fII

2-113

II)
II)

N

f
c

......
....

II)

N

C")

CD

a.
C

7.0 Electrical Characteristics (Continued)
DC electrical characteristics for all Open Drain output signals (INT, ACK and CR).
Symbol

Parameter

Conditions

Min

Typ

Max

Units

VOL

Output Low Voltage

IOL = SmA

0.5

V

loz

TRI-STATE Leakage

VOUT = Vee

10

,.A

DC electrical characteristics for all 100k ECL input and output signals.
Symbol

Parameter

Conditions

Min

VOH

Output High Voltage

VIN = VIH (max)

VOL

Output Low Voltage

VIN = VIL(min)

VIH
VIL

Typ

Max

Units

Vee - 1.025

Vee - 0.S80

V

Vee - 1.810

Vee - 1.620

V

Input High Voltage

Vee -1.165

Vee - 0.S80

V

Input Low Voltage

Vee - 1.S10

Vee - 1.475

V
,.A
,.A

IL

Input Low Current

VIN = GND

-10

IH

Input High Current

VIN = Vee

100

Supply Current electrical characteristics
Symbol

Parameter

Conditions

Min

Typ

Max

Units

Total Supply
LBC = 12.5 MHz
Icc
mA
440'
TXC = 125 MHz
Current
'Note: The PLAYER device has two pairs of differential ECL outputs, therefore 60 mA of the total supply current is actually consumed by external termination
resistors and the maximum current consumed by the PLAYER device alone is only 3BO mAo The EeL termination current is calculated as follows:
VOILmax = Vee - 0.88V
VOLmax = Vee - 1.S2V
Since the outputs are differential, the average output level is Vee - 1.25V. The test load per output is son at Vee - 2V, therefore the extemalload current
through the son resistor is:
'LOAD = [(Vee - 1.25) - (Vee - 2)]/50
= 0.015A
=15mA.
As result, two pairs of EeL outputs consume so mAo

2-114

7.0 Electrical Characteristics (Continued)
7.4 AC ELECTRICAL CHARACTERISTICS
The AC Electrical characteristics are over the operating range, unless otherwise specified.
AC Characteristics for the Control Bus Interface
Symbol

Parameter

Min

Max

Units

T1

CE Setup to LBC

5

ns

T2

LBCPeriod

80

ns

T3

LBC to ACK Low

T4

CE Low to ACK Low

T5

LBC Low to CBO(7-0) and CBP Valid

290

45

ns

540

ns

60

ns

60

ns

T6

LBC to CBO(7-0) and CBP Active

T7

CE Low to CBO(7 -0) and CBP Active

225

475

ns

T8

CE Low to CBO(7 -0) and CBP Valid

265

515

ns

T9

LBC Pulse Width High

35

45

ns

T10

LBC Pulse Width Low

35

45

ns

T11

CE High to ACK High

45

ns

T12

R/W, CBA(7-0), CBO(7-0) and
CBP Set up to CE Low

T13

CE High to R/W, CBA(7-0),
CBO(7-0) and CBP Hold Time

5

ns

0

ns

T14a

R/W to LBC Setup Time

0

ns

T14b

CBA to LBC Setup Time

10

ns

T14c

CBO and CBP to LBC Setup Time

0

ns

T15

ACK Low to CE High Lead Time

0

ns

T16

CE Minimum Pulse Width High

20

T17

CE High to CBO(7-0) and CBP TRI-STATE

T18

ACK High to CE Low

T19

CBO(7-0) Valid to ACK Low Setup

20

ns

T20a

LBC to R/W Hold Time

10

ns

T20b

LBC to CBA Hold Time

10

ns

T20c

LBC to CBO and CBP Hold Time

20

ns

ns
55

0

ns
ns

T21

LBC to INT Low

55

ns

T22

LBC to TNT High

60

ns

Asynchronous Definitions
T4(min)

T1 +(3*T2)+T3

T4 (max)

T1 + (4 * T2) + T3

T7(min)

T1 + (2 • T2) + T6

T7(max)

T1 + (3 • T2) + T6

T8(min)

T1 + (2' T2) + T9 + T5

T8 (max)

T1 + (3 • T2) + T9 + T5

Note: MinIMax numbers are based on T2

~

80 ns and T9

~

fJI
T10

~

40ns.

2-115

~

~
C")
co

.--------------------------------------------------------------------,
7.0 Electrical Characteristics (Continued)

Q.

Q
.....
.-

-h

~

~

N

C")

--,

~

~

116

R/W

Q

~
CBA

XXX

ADDRESS VAUD IN

caD &

2QQ{

DATA YALID IN

CBP

[XXX

~X

:X :X

.~7 ~ ~
T~

\

~
TL/F/1038B-23

TL/F/1D3BB-22

FIGURE 7·1. Control Bus Write Cycle Timing

FIGURE 7-2. Control Bus Read Cycle Timing

TLlF/103BB-35

FIGURE 7-3. Control Bus Synchronous Write Cycle Timing

LBC

R/fl

COBCBP
It

---------..::::..~~~~~~iP

m ------------+--""'\
TLlF/103B6-24

FIGURE 7-4. Control Bus Synchronous Read Cycle Timing

'TL/F/103BB-44

FIGURE 7-5. Control Bus Interrupt Timing

2·116

C

"tI

7.0 Electrical Characteristics (Continued)

ext

Co)

N

AC Characteristics for the Clock Signals
Symbol

Parameter

T23

TBC to TXC Hold Time

T24

TBC to TXC Setup Time

T25

TBC to LBC Skew

Conditions

Min

(Note 1)
(Note 1)

Typ

Max

2

ns

2.5
10

Units

ns
22

ns

T26

RXC Duty Cycle

(Note 1)

3.0

5.0

ns

T27

TXC Duty Cycle

(Note 1)

3.5

4.5

ns

T2B

TBC Duty Cycle

37

43

ns

T29

LBC Duty Cycle

35

45

ns

C1I
....
....
C

"tI
ext

Co)

N

C1I
C1I

Note 1: RXC duty cycle, TXC duty cycle, and TBC to TXC setup time are not tested, but are assured by correlation with characterization data.
Note 2: When PLAYER is used in FOOl applications, TBC and LBC periods will be 80 ns and RXC and TXC periods will be 8 ns.

RXC

TXC

TSC

LOC

i---T29---i
TL/F/l0386-36

FIGURE 7-6. Clock Signals

fII

2-117

II)
II)

N

C')

co
a..

C
.....
.,...

II)

N

C')

7.0 Electrical Characteristics (Continued)
AC Characteristics for PHY Port Interfaces
Symbol

Conditions

Min

Typ

Max

Units

T30

LBC to Indicate Data Changes
from TRI-STATE to Data Valid

70

ns

T31

LBC to Indicate Data Changes
from Active to TRI-STATE

70

ns

T32

LBC to Indicate Data Sustain

T33

LBC to Valid Indicate Data

T34

Request Data to LBC Setup Time

15

ns

T35

Request Data to LBC Hold Time

5

ns

~

C

Parameter

LBC

7

ns
45

ns

'r-

-'
.....

AIP,BIP,
AIC,BIC, AID,BID

T30

Jm

--

J

..... T31 I-

~.

VALID DATA

XX)

VALID DATA

'IJ

-T34----- !--T35 .....
ARP, BRP,
ARC,BRC,
ARD,BRD

J

VALID DATA
TLlF/10386-37

FIGURE 7·7. PHY Port Interface Timing

,

2-118

c

."

7.0 Electrical Characteristics (Continued)

CD

Co)

N
U'I

AC Characteristics for the Serial Interface
Symbol

Parameter

Conditions

Min

Typ

Max

Units

T36

RXD to RXC Setup Time

2

ns

T37

RXD to RXC Hold Time

2

ns

T38

TXC to TXD Change Time

8

ns

T39

TXC to LBD Change Time

8

ns

T40

CD Min Pulse Width

120

ns

T41

SD Min Pulse Width

120

ns

RXC+/-

RXD+/-

TXC+/-

TXD+/-

LBD+/-

;

CD

SD

'~=1
141

f

~

FIGURE 7-8. Serial Interface Timing

2·119

TL/F/l038B-38

.....
.....
C

."
CD

Co)

N
U'I
U'I

~r-------------------------------------------------------------------~

N

CO)

~

C
......
.\I)

7.0 Electrical Characteristics (Continued)
7.5 AC TEST CIRCUITS

N

CO)

~

C

Tl/F/l0386-28

FIGURE 7·10. Switching Test Circuit
for All TTL Output Signals

2k.Q

-

521.
TLlF/l0386-26

Note: 51 is closed for TPZL and TPLZ
52 is closed for TPZH and TPHZ
51 and 52 are open otherwise

FIGURE 7·9. Switching Test Circuit
for All TRI-STATE Output Signals

TL/F/l0386-30

Note: CL = 30 pF Includes seepe and all stray capacitance without device In
test fixture

TL/F/l0386-29

FIGURE 7-11. Switching Test Circuit
for All Open Drain Output Signals
(INT, ACK and eli)

FIGURE 7·12. Switching Test Circuit
for All ECL Input and Output Signals

2·120

IC
"tI

Test Waveforms

00
Co)

N

....
.....
U1

IC
"tI
00

VCC -l.165V

VCC -1.475V

Co)

...F\...

N

U1
U1

,

i~-1.4V
, J ,~V
'CC- ,.~'

,~'

TLlF/l0386-39

FIGURE 7-13. EeL Output Test Waveform

3.0V

''='"
,

OVJ. 1.5V

\....

'~

:~

,~.'

TL/F/l0386-40
Note: All CMOS inputs and outputs are TTL compatible

FIGURE 7-14. TTL Output Test Waveform

--7:'" 1.5V
___-+,___...J11.5V
,T
,
pHZ
0/,

LBC

CBD<7:0>I I< CBP

f

~
:

;TpLZ,
~,

,

1.5V'

,

VOL +O.5V
TL/F/l0386-41

FIGURE 7-15. TRI-STATE Output Test Waveform

2-121

II)
II)

C"I
CO)

co

a.

C
.....
....

~
CO)
co

a.
C

8.0 Detailed Descriptions
8.2 NOISE EVENTS

This section describes in detail several functions that had
been discussed previously in Section 3.0, Functional Descriptions .

A Noise Event is defined as follows:
A noise event is a noise byte, a byte of data which is not in
line with the current line state, indicating error or corruption.

8.1 FRAMING HOLD RULES
DETECTING JK

Noise Event = [SO. - CD) +

The JK symbol pair can be used to detect the beginning of a
frame during Active Line State (ALS) and Idle Line State
(ILS).

[SO • CD • PI • - (II + JK + AB)) +
[SO • CD • - PI • (PB = II) • AB)

While the Line State Detector is in the Idle Line State the
PLAYER device "reframes" upon detecting a JK symbol
pair and enters the Active Line State.
During Active Line State, acceptance of a JK symbol (reframing) is allowed on anyon-boundary JK which is detected at least 1.5 byte times after the previous JK.

Where:

•
+

Logical AND
Logical OR
Logical NOT

SO = Signal Detect
CD = Clock Detect
Previous Byte
PB
PLS = Previous Line State

During Active Line State, once reframed on a JK, the subsequent off-boundary JK is ignored, even if it is detected beyond 1.5 byte times after the previous JK.
During Active Line State, an Idle or Ending Delimiter
symbol will allow reframing on any subsequent JK, if a JK is
detected at least 1.5 bytes times after the previous JK.

m

PI

DETECTING HALT·HALT 8. HALT·QUIET
During Idle Line State, the detection of a Halt-Halt, or HaltQuiet symbol pair will still allow the reframing of any subsequent on-boundary JK.

PHY Invalid = HLS + QLS +
NLS + ( ULS •
(ALS + ILS))l

ILS = Idle Line State
ALS = Active Line State
ULS = Unknown Line State

Once a JK is detected during Active Line State, off-boundary Halt-Halt, or Halt-Quiet symbol pairs are ignored until the
Elasticity Buffer (EB) has an opportunity to recenter. They
are treated as violations.

HLS = Halt Line State
QLS = Quiet Line State
MLS = Master Line State
NLS = Noise Line State
ULS = Unknown Line State

After recentering on a Halt-Halt, or Halt-Quiet symbol pair,
all off-boundary Halt-Halt or Halt-Quiet symbol pairs are ignored until the EB has a chance to recenter during a line
state other than Active Line State (which may be as long as
2.8 byte times).

J
K
R

S

2-122

Idle symbol
First symbol of start delimiter
Second symbol of start delimiter
Reset symbol
Set symbol

T

End delimiter

A
B

n+R+S+T

n

= Any data symbol

n+R+S+T+1

MLS
[PLS

+

.----------------------------------------------------------------------.0
;g

8.0 Detailed Descriptions (Continued)

Co)

N
U1

8.3 LINK ERRORS

.....
......
o

A Link Error is defined as follows:

;g

Link Error Event = [ALS • (1-1 + xV + Vx +
H-H)) + [ALS. -SOl + [ILS.
-(II + JK)) + ilLS. -SD)1 +
[ULS • (PLS = ALS) • LinLError_Flag • - SB • - (HH + HI +
II + JK)1
Set LinLError_Flag = [ALS • (HH
SH + TH)1

+

NH

+

RH

Co)

N
U1
U1

+

Clear LinLError_Flag = [ALS. JKI + ilLS. JKI +
[ULS • (PLS = ALS •
LinLError_Flag • - SB •
- (HH + HI + II + JK)1
Where:

+

Logical NOT
Logical OR

•

Logical AND

ILS
Idle Line State
ALS = Active Line State
ULS = Unknown Line State
x

= Any symbol

H
J
K
V

= Halt symbol

R
S

= Reset symbol

T
N

= End delimiter symbol

Idle symbol
= First Symbol of start delimiter
= Second symbol of start delimiter
= Violation symbol
= Set symbol
= Data symbol converted to 0000 by the PLAY-

ER device Receiver Block in symbol pairs that
contain a data and a control symbol
PLS = Previous Line State
SO = Signal Detect
SB = Stuff Byte: Byte inserted by EB before a JK
symbol pair for recentering or due to off-axis
JK

2-123

Ln r-------~----------------------------------------------------------------------__,
Ln
N

CO)

8.0 Detailed Description (Continued)

C
.....
.,...

The repeat filter prevents the propagation of code violations to the downstream station .

co
D.;

8.4 REPEAT FILTER

Ln
N

CO)

~

C

REPEAT
nn

~
JK

~

END

IDLE
WW

TW
TW

JK+TPARITY

~

JK
JK

WW

:Ll

WI
F_IDLE

OK·W) + TPARITY
NT
NT

"

"

JK
JK

TW
TI
NI+IX
(PHY VALID)
(V'+I') ALSZILSZ

"

"HALT
(H+S+R+V)X+N(f·~ + TPARITY

a·JK)x + TPARITY

HH
JK
JK

HH
IX

"

(PHY VALID)
(V'+I') ALSZILSZ
HH
TL/F/l0386-31
Note: Inputs to the Repeat Filter state machine are shown above tha transition lines, while outputs from the state machine are shown below the transition lines.
Nota: Abbreviations used in the Repeat Filter State Diagram are shown in Table VIII.

FIGURE 8·1. Repeat Filter State Diagram

2·124

8.0 Detailed Descriptions (Continued)
The Repeat Filter complies with the FOOl standard by ob·
serving the following:
1. In Repeat State, violations cause transitions to the Halt
State and two Halt symbol pairs are transmitted (unless
JK or Ix occurs) followed by transition to the Idle State.
2. When Ix is encountered, the Repeat Filter goes to the Idle
State, during which Idle symbol pairs are transmitted until
a JK is encountered.
3. The Repeat Filter goes to the Repeat State following a JK
from any state.
The END State, which is not part of the FOOl standard,
allows an R or S prior to a T within a frame to be recognized
as a violation. It also allows NT to end a frame as opposed
to being treated as a violation.

TABLE 8·1. Abrevlatlons used In

the Repeat Filter State Diagram
Force Idle-True when not in Active
Transmit Mode
W:
Represents the symbols R, or S, or T
-TPARITY: Parity error
nn:
Data symbols (for C = 0 in the PHY·MAC
Interface)
N:
Data portion of a control and data symbol
mixture
X:
Any symbol (i.e. don't care)
V':
Violation symbols or symbols inserted by
the Receiver Block
I':
Idle symbols or symbols inserted by the
Receiver Block
Active Line State or Idle Line State (i.e.
ALSZILSZ:
PHY Invalid)
- ALSZILSZ: Not in Active Line State nor in Idle Line
State (i.e. PHY Valid)
H:
Halt symbol
R:
Reset symbol
S:
Set symbol
T:
Frame ending delimiter
Frame start delimiter
JK:
I:
Idle symbol (Preamble)
V:
Code violations

•
2·125

~r--------------------------------------------------------------------,
~

N

C')

~

C
.....
....

8.0 Detailed Descriptions (Continued)
8,5 SMOOTHER

CONTRACT

EXTEND

~

N

C')

SE + F_IDLE

co

a.

~

C

SE+F_IDLE

II

II'X n_1= w.

Xn
C=C+ 1

Xn+1
C= C +1

_

.

R'c>o

. 1I'(Xn- 1 = II +X n- 1 = nn)

...
jj'JK

Xn
C= C+ 1

Xn
C=C+ 1

.

......
JK'C> 7'X n_1 = II

JK'C< 7'X n_1= II

Xn- I

...

Xn
C=O

Xn
C=O

JK'X n_1 = II

......

Xn- 1
C=O

-II'JK'C = 0
Xn

..L

""

.
Notes:
SE: Smoother Enable
C: Preamble Counter
F_IDLE: Force_Idle (Stop or A'fM)
Xn: Current Byte
Xn-l: Previous Byte

TL/F/l0388-32

WoRST

FIGURE 8-2, Smoother State Diagram

2·126

C

."

co
Co)

8.0 Detailed Descriptions (Continued)
Line State are Idle symbols, then the Symbol Decoder generates l'kiLS as its output. Note that in this case the coded
byte is represented in the form Receive State (b7-4),
Known/Unknown Bit (b3) and the Last Known Line State
(b2-0). The Receive State is 4 bits long and it represents
either the PHY Invalid (0011) or the Idle Line State (1011)
condition. The Known/Unknown Bit shows if the symbols
received match the line state information in the last 3 bits.

8.6 NATIONAL BYTE·WIDE CODE FOR PHY·MAC IN·
TERFACE

The PLAYER device outputs the National byte-wide code
from its PHY Port Indicate Output to the MAC device. Each
National byte-wide code may contain data or control codes
or the line state information of the connection. Table 8-2
lists all the possible outputs.
During Active Line State all data and control symbols are
being repeated to the PHY Port Indicate Output with the
exception of data in data-control mixture bytes. That data
sybmol is replaced by zero. If only one symbol in a byte is a
control symbol, the data symbol will be replaced by 0000
and the whole byte will be presented as control code. Note
that the Line State Detector recognizes the incoming data
to be in the Active Line State upon reception of the Starting
Delimiter (JK symbol pair).

During any line state other than Idle Line State or Active
Line State, the Symbol Decoder generates the code V'kLS
if the incoming symbols match the current line state. The
symbol decoder generates V'uLS if the incoming symbols
do not match the current line state.

During Idle Line State any non Idle symbols will be reflected
as the code l'uILS. If both symbols received during Idle

2-127

~

U1

.....
.......
C

."

co
Co)

~

U1

II)
II)

N

Cf)

~

8.0 Detailed Descriptions (Continued)
Table 8-2.

C
......
....

Current Line State

II)

N

Cf)

Symbol 1
Data
Control Bit

Symbol 2
Control Bit
Data

National Code
Control Bit
Data

co

ALS

0,

n

0,

n

0,

non

C

ALS

0,

n

1,

C

1,

N-C

a.

ALS

1,

C

0,

n

1,

CoN

ALS

1,

C

1,

C

1,

C-C

ILS

1,

I

1,

I

1,

I'-k-LS

ILS

1,

I

x,

Not!

1,

I'-u-LS

ILS

Not!

1,

I

1,

I'-u-LS

Not I

1,

I'-u-LS

x

x,
x,

Not!

Stuff Byte during ILS

x,
x,
x,

x

1,

I'-k-ILS

Not ALS and Not ILS

1,

M

1,

M

1,

V'-k-LS

Not ALS and Not ILS

1,

M

x,

NotM

1,

V'-u-LS

Not ALS and Not ILS

x,
x,
x,

NotM

1,

M

1,

V'-u-LS

NotM

x,
x,

NotM

1,

V'-u-LS

x

1,

V'-k-LS, V'-u-LS
or I'-u-ILS

ILS

Not ALS and Not ILS
Stuff Byte during
NotlLS

x

EB Overflow/Underflow

1,

00111011

SMT PI Connnection (LSU)

1,

00111010

Where:
n = Any data symbol in [0,1,2, ... Fl
C = Any control symbol in [V, R, S, T, I, HI
N = 0000 = Code for data symbol in a data control mixture byte
I = Idle Symbol
M = Any symbol that matches the current line state
I' = 1011 = First symbols of the byte in Idle Line State
V' = 0011 = PHY Invalid
LS = Line State
ALS = 000
ILS = 001
NSD = 010
MLS = 100
HLS = 101
QLS = 110
NLS = 111
u = 1 = Indicates symbol received does not match current line state
k = 0 = Indicates symbol received matches current line state
x = Don't care

2-128

C
'"D

8.0 Detailed Descriptions (Continued)

Q)

Example:

(II

W
N

Incoming 5B Code

Decoded 4B Code

National Byte-Wide Code (wlo parity)

.....
.....

9876543210

C321 0 C 3210

C 7653 3210

Q)

1111111111 (II)

1 10101 1010 (II)

110110001 (I'-k-ILS)*

W
N

11111 11111 (II)

1 10101 1010 (II)

110110001 (I'-k-ILS)

1111111111 (II)

1 10101 1010 (II)

110110001 (I'-k-ILS)

11000 10001 (JK)

1110111101 (JK)

1 1101 1101 (JK Symbols)

...... --

--- -- (xx)

O----O----(xx)

0----

- - - - (Data Symbols)

..........
..........

-----(xx)

0----0---- (xx)

0----

- - - - (Data Symbols)

--- -- (xx)

O----O----(xx)

0----

- - - - (Data Symbols)

(More data ...)

..........
..........

---- - (xx)

O----O----(xx)

0- - --

- - - - (Data Symbols)

--- -- (xx)

0----0---- (xx)

0----

- - - - (Data Symbols)

-----

--- -- (xx)

O----O----(xx)

0- - --

- - - - (Data Symbols)

01101 00111 (TR)

1010110110 (TR)

1 0101 0110 (T and R Symbols)

0011100111 (RR)

1011010110 (RR)

1 01100110 (Two R Symbols)

11111 11111 (II)

1 10101 1010 (II)

1 1010 1010 (Idle Symbols)

11111 11111 (II)

1101011010 (II)

110101010 (Idle Symbols)

11111 11111 (II)

1101011010(11)

110110001 (I'-k-ILS)
110110001 (I'-k-ILS)

1111111111 (II)

1101011010 (II)

11111 11111 (II)

1 10101 1010 (II)

1 10110001 (I'-k-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

110111001 (I'-u-ILS)

0010000100 (HH)

1 0001 1 0001 (HH)

100110101 (V'-k-HLS)

0010000100 (HH)

1 0001 1 0001 (HH)

1 0011 0101 (V'-k-HLS)

0010000100 (HH)

1 0001 1 0001 (HH)

100110101 (V'-k-HLS)

11111 11111 (II)

1101011010(11)

1 0011 1101 (V'-u-HLS)

11111 11111 (II)

1 101011010 (II)

110110001 (I'-k-ILS)

1111111111 (II)

1 10101 1010 (II)

110110001 (I'-k-ILS)

·Assume the receiver is in the Idle Line State.

2-129

C

'"D

(II
(II

~

r------------------------------------------------------------------------------------,

I ~National
c

~ Semiconductor

OP83261 BMACTM Oevice
(FOOl Media Access Controller)
General Description

Features

The OP83261 BMAC device implements the Media Access
Control (MAC) protocol for operation in an FOOl token ring.
The BMAC device provides a flexible Interface to the BSITM
device. The BMAC device offers the capabilities described
in the ANSI X3T9.5 MAC Standard and several functional
enhancements allowed by the Standard.

• Full duplex operation with through parity
• Supports all FOOl ring scheduling classes (asynchronous, synchronous, restricted asynchronous, and
immediate)
• Supports individual, group, short, long and external
addressing
• Generates Beacon, Claim and Void frames without
intervention
• Provides extensive ring and station statistics
• Provides extensions for MAC level bridging
• Provides separate management interface
• Uses low power microCMOS

The BMAC device transmits, receives, repeats, and strips
tokens and frames. It uses a full duplex architecture that
allows diagnostic transmission and self testing for error isolation. The duplex architecture also allows full duplex data
service on point-to-point connections. Management software is also aided by an array of on chip statistical counters,
and the ability to internally generate Claim and Beacon
frames without program intervention. A multi-frame streaming interface is provided to the system interface device.

TO HOST SYSTEM

DP83241
COD
(CLOCK
DISTRIBUTION)

DP83231
CRD
(CLOCK
RECOVERY)

'----...r--'
TO FIBER OPTIC
TRANSCEi.ER PAIR

FIGURE 1-1. FOOl Chip Set Block Diagram

2-130

TL/F/10387-1

Table of Contents
1.0 FOOl CHIP SET OVERVIEW

6.0 CONTROL INFORMATION
6.1 Conventions
6.2 Access Rules
6.3 Operation Registers
6.4 Event Registers
6.5 MAC Parameters
6.6 Timer Thresholds
6.7 Event Counters

2.0 ARCHITECTURAL DESCRIPTION
2.1 Ring Engine
2.2 Interfaces
3.0 FEATURE OVERVIEW
4.0 FOOl MAC FACILITIES
4.1 Symbol Set
4.2 Protocol Data Units
4.3 Frame Counts
4.4 Timers
4.5 Ring Scheduling

7.0 SIGNAL DESCRIPTIONS
7.1 Control Interface
7.2 PHY Interface
7.3 MAC Indication Interface
7.4 MAC Request Interface
7.5 Electrical Interface
7.6 Pinout Summary
7.7 Pinout Diagram

5.0 FUNCTIONAL DESCRIPTION
5.1 Token Handling
5.2 Servicing Transmission Requests
5.3 Request Service Parameters
5.4 Frame Validity Processing
5.5 Frame Status Processing
5.6 SMT Frame Processing
5.7 MAC Frame Processing
5.8 Receive Batching Support
5.9 Immediate Frame Transmission
5.10 Full Duplex Operation
5.11 Parity Processing

8.0 ELECTRICAL CHARACTERISTICS
8.1 Absolute Maximum Ratings
8.2 Recommended Operating Conditions
8.3 DC Electrical Characteristics
8.4 AC Electrical Characteristics
APPENDIX A. RING ENGINE STATE MACHINES

A.l Receiver
A.2 Transmitter

2-131

,..

CD

N

C')

CO

a..

C

r---------------------------------------~--------------------------------------------,

1.0 FDDI Chip Set Overview
National Semiconductor's DP83200 FDDI chip set consists
of five components as shown in Figure't-t. For more information on the other devices of the chip set, consult the
appropriate datasheets and application notes.

DP83261 BMACTM Device
Media Access Controller
The BMAC device implements the Timed Token Media Access Control protocol defined by the ANSI X3T9.5 FDDI
MAC Standard.

DP83231 CRDTM Device
Clock Recovery Device

Features

The Clock Recovery Device extracts a 125 MHz clock from
the incoming bit stream.

• All of the standard defined ring service options. '
• Full duplex operation with through parity

Features
• PHY Layer loopback test
• Crystal controlled
• Clock locks in less than 85

• Supports all FDDI Ring Scheduling Classes (Synchronous, Asynchronous, etc.)
• Supports Individual, Group, Short, Long, and External
Addressing

"'S

• Generates Beacon, Claim, and Void frames internally

DP83241 CDDTM Device
Clock Distribution Device

• Extensive ring and station statistic gathering
• Extensions for MAC level bridging
• Separate management port that is used to configure and
control operation
''

The Clock Distribution Device generates the clocks required
by the FDDI Devices on a board.

• Multi-frame streaming interface

Features

"
..
• Utilizes a 12.5 MHz crystal or reference

DP83265 BSITM Device
System Interface

• Generates the 125 MHz, 25 MHz, and 1,2.5 MHz clock
required by the BMAC, PLAYER, and BSI devices

The BSI device implements the interface between the
BMAC device and a host system.

• Generates 5 phases of the 12.5 MHz clock for use by
external system logic

Features

DP83251155 PLAYERTM Device
Physical Layer Controller

• 32-bit wide Address/Data path with byte parity
• Programmable transfer burst sizes of 4 or 8 32-bit words
• Interfaces to low cost DRAMs or directly to system bus

The PLAYER device implements the Physical Layer (PHY)
protocol as defined by the ANSI FDDI PHY X3T9.5 Standard.

• Provides 2 Output and 3 Input Channels
• Supports Headerllnfo splitting
• Operates from 12.5 MHz to 25 MHz synchronously with
the host system

Features
• 4B/5B encoders and decoders

• Efficient data structures

• Framing logic
• Elasticity Buffer, Repeat Filter and Smoother

• Programmable Big or Little Endian alignment
• Full duplex data path allows transmission to self

• Line state detector/generator

• Confirmation status batching services

• Link error detector

• Receive frame filtering services

• Configuration switch
• Full duplex operation
• Separate management port that is used to configure and
control operation
In addition, the DP83255 contains an additional PHY_
Data.request and PHY_Data.indicate port required for concentrators and dual attach stations.

2-132

r----------------------------------------------------------------------.c

"tI

co
Co)

2.0 Architectural Description
Source Address. Frames with a Source Address matching
one of the station individual addresses are stripped by the
Ring Engine. Status is available at the MAC interface for
every transmitted frame.

The BMAC device receivers, transmits, and strips or repeats
Protocol Data Units (PDUs, i.e., Tokens and Frames) and
handles the token management functions required by the
timed token protocol in accordance with the FOOl MAC
Standard.

For reception, the Ring Engine sequences through the incoming byte stream, comparing received destination addresses against the station's short or long address. The results of these comparisons are made available at the MAC
interface. The System Interface then decides how to handle
the frame. In the normal case, a frame with a Destination
Address matching one of the station addresses is copied
and passed to the system.

The BMAC device is comprised of the Ring Engine (RE) and
interfaces to the Control Bus (Control Interface), the
PLAYER device (PHY Interface) and a System Interface
such as the BSI device (MAC Interface) as shown in
Figure 2-1.
On transmission, the system interface prepares one or more
frames for transmission and requests a service opportunity.
Based on the requested service class and requested token
type, the Ring Engine waits for a token meeting the requested criteria. When a token is captured, the Ring Engine signals the interface and soon thereafter transmission begins.
After traversing the ring, frames are stripped based on the

...

The BMAC device utilizes a full duplex, byte-wide (symbol
pair) architecture. There are two bytes of delay in the Transmit path, three bytes of delay in Receive and Repeat paths,
and two bytes of delay in the Loopback path.

To HOST SYSTEM
H
Flags II:
Control
Signals

MA..INDICATE (7:0)
MA..INDICATE PARITY

I

Transmit"
Parameters II:
Handshake
Signals ~

~

MA..REQUEST (7:0)
MA.:..REQUEST PARITY

~"

I

MAC INTERFACE

r---

8
z

iI
0
r-

ID

RING ENGINE

I

I

I

PHY INTERFACE
.oil

"PH_INDICATE (7:0)
PH_INDICATE CONTROL
PH_INDICATE PARITY

PH_REQUEST (7:0)
PH_REQUEST CONTROL
PH_REQUEST PARITY

c

'"z
;;:I

'"n>!

...

I-

.
...

0'

...

I
r-

ID

c

'"

'II"
To PLAYER DEVICE
TUF/10387-2

FIGURE 2-1. BMAC Device Interfaces

2-133

...
N

en

.CD

r-----------------------------------------------------------------------------------------~

~

2.0 Architectural Description

c

2.1 RING Er,lGINE
The BMAC device is operated by the'Ring Engine which is
comprised of four blocks: Receiver, Transmitter, MAC Pa,
rameter RAM, and Counters/Timers as shown in Figure 2-2.

~

(Continued)
lected. During Frame Repeating, data from the Receiver
Block is selected.
During Frame Transmission, thEi Transmitter Block performs
the following functions:
'
• Captures a token to gain the right to transmit

2.1.1 Receiver
The Receiver Block accepts data from the PLAYER device
in the, byte stream format (PH_Indicate).
Upon receiving the data, the Receiver Slack performs the
following functions: .
.
,

• Transmits one or more frames
• Generates the Frame Check Sequence during transmission and appends it at the end of the frame
• Generates the Frame Status field that is transmitted at
the end of the frame

• Determines the beginning and ending of a Protocol Data
Uflit(PDU)
• Decodes the Frame Control field to determine the PDU
type (frame or token)

• Issues the token al'the erid of frame transmission'
During Frame Repeating, the Transmitter Block performs
the following functions:
• Repeats the received frame and modifies the Frame
Status field at the end of the frame as specified by the
standard

• Compares the received Destination and Source Addresses with the internal addresses
• Processes data within the frame
• Calculates and checks the Frame Check Sequence at
the end of the frame

Whether transmitting or repeating frames, the Transmitter
Block also performs the following functions:
• Strips the frame(s) that are transmitted by this station

• Checks the Frame Status field
And finally, the Receiver Biock presents the data to the
MAC Interface along with the appropriate control signals
(MLlndicate).

• Generates Idle symbols between frames
Data is presented from the Transmitter Block to the
PLAYER device in the byte stream format (PH_Request).

2.1.2 Transmitter

2.1.3 MAC Parameter RAM

The Transmitter Block inserts frames from this station into
the ring in accordance with the FDDI Timed Token MAC
protocol. It also repeats frames from other stations in the
ring. The Transmitter block multiplexes data from the ML
Request Interface and data from the Receiver Block. During
Frame Transmission, data from the Request Interface is se-

The MAC Parameter RAM block is a dual port RAM that
contains MAC parameters such as the station's short and
long addresses. These parameters are initialized via the
Control Interface. Both the Receiver and Transmitter Blocks
may access the RAM.

To MAC INTERFACE
A

~A..lndlcate

Flags Be
Control
Signals

" " , i,':> '
.,'

.1 Parameter 1

AMC

,0,

I

<::::FCSf'l

........
,"

,',

.....

,'

,'

.'

,','
"

..........

':':~":'.::

.::::
,"

I

TSM

RSM

',"

...... .

',"

",'.'

",

., .. '

....

.

...... . ., ,' ,, ''

",

",

ROM:

I Countersl
TImers I

,','

....

RAM

.:

f

".,'

Repeat Path

.....

, ' , ' ",'

['~~s';;i\t~r :;';:;::
QU D'."'-\..1.

To PHY INTERFACE
TLlF1103B7-4

FIGURE 2-2. Ring Engine OV6i"ylew Block Clagiam

2-134

C

"U
CD

2.0 Architectural Description

(Continued)
The Receiver uses these parameters to compare addresses
in incoming frames with its addresses stored in the Parameter RAM.
The Transmitter uses the Parameter RAM for generating the
Source Address for all frames (except when Source Address Transparency is enabled) and for the Destination Address and Information fields in Claim and Beacon frames.
The MAC Parameter RAM block is described in greater details in Section 6.5.
2.1.4 Counter/Timer
The Counter/Timer block maintains all of the Counters and
Timers required by the Standard.

Co)

The MAC Interface is synchronous and is divided into separate MAC Request and MAC Indication interfaces.
Data is transferred from the system interface to the Ring
Engine via the MAC Request Interface. The M~Request
Interface consists of a parity bit (Odd parity) and byte-wide
data along with the transmit parameters and handshake signals. The MAC Request Interface utilizes a handshake that
separates token capture from data transmisson. A captured
token may be held until it is no longer usable. Void frames
are automatically generated to allow data interface logic as
much time as it needs to prepare a transmission.

N

G)

.....

Data is transferred from the Ring Engine to the system interface via the MAC Indication Interface. The M~lndicate
Interface consists of a parity bit (Odd parity) and byte-wide
data along with Addressing Flags and Frame Sequencing
signals. The Addressing Flags give the result of the address
comparisons performed by the Ring Engine. These are used
to decide whether to continue to copy or to reject frames.
The MAC Indication Interface also accepts inputs to determine how to set the control indicators and increment the
statistical counters based on external address comparison
logic and frame copying logic. Frames may also be stripped
based on external comparisons.

Events which occur too rapidly for software to count. such
as the various Frame Counts. are included in the Event
Counters. The size of the wrap around counters has been
chosen to require minimal software intervention even under
marginal operating conditions. Most of the Counters increment in response to events detected by the Receiver. The
Counters are readable via the Control Interface.
The Token Rotation and Token Holding Timers which are
used to implement the Timed Token Protocol are contained
within the Timer Block.
The Counters and Timers are described in detail in Sections
6.6 and 6.7.

2.2.3 Control Bus Interface
The Control Interface implements the interface to the Control Bus by which to initialize. monitor and diagnose the operation of the BMAC device. The Control Interface is an
8-bit asynchronous interface in order to minimize pinout and
layout. All information that must be synchronized with the
data stream crosses the MAC Interface.

2.2 INTERFACES
2.2.1 PHY Interface
The PHY Intreface is a synchronous interface that provides
an encoded byte stream to the PLAYER device (the PHY
Request byte stream). and receives an encoded byte
stream from the PLAYER device (the PHY Indication byte
stream).
.

The Control bus is separated completely from the MAC and
PHY Interfaces in order to allow independent operation of
the processor on the Control Bus. The Control Interface
provides the synchronization between the Control Bus and
the Ring Engine.

The BMAC device connects to one or two PLAYER devices
via the PH_Indicate and P~Request Interfaces.
Data is transferred from the PLAYER device to the Ring
Engine via the PH_Indicate Interface. Data is transferred
from the Ring Engine to the PLAYER device via the PH_
Request Interface.
The 10-bit byte transferred in both directions across the
PH_Indicate and PH_Request interfaces consists of one
parity bit (Odd parity). one Control bit. and 8 bits of data.
The Control Bit determines if the 8 data bits are a data
symbol pair or a control symbol pair.

3.0 Feature Overview
The BMAC device implements the standard FDDI MAC protocol. It also provides additional addressing. bridging. and
service class functions to allow maximal flexibility in designing an FDDI station.
The BMAC device offers extensive diagnostic features including a number of diagnostic counters. a dedicated interface for control and configuration. and a capability to perform Self Testing. Furthermore. the BMAC device allows the
tuning of certain parameters to increase the performance of
the network.

2.2.2 MAC Interface
The MAC Interface provides the required information and
handshakes to allow a system interface (such as the
DP83265 BSI) to exploit the capabilities of the Ring Engine.

•
2·135

....

~

CO)

CD

a.
Q

3.0 Feature Overview

(Continued)
3.1 FDDI MAC SUPPORT
The BMAC device implements the Standard ANSI X3T9.5
FOOl MAC protocol for transmitting, receiving, repeating
and stripping frames. Many of the. capabilities defined in
MAC-2 are included in the BMAC device such as bridging
end station support for setting the control indicators, and
the statistic counters. The BMAC device provides all of the
information necessary to implement the service primitives
defined in the standard.
The BMAC device also implements many of the permitted
extensions to the FOOl-MAC standard as captured In the
FOOl MAC-2 document. These include the extensions for
MAC level bridging, Group Addressing support that can be
used for SMT, reporting of additional events to aid the ring
management processes and enhanced versions of the state
machines.

These counters allow measurement of the following:
• Number of frames transmitted and received by the station
• Number of frames copied as well as frames not copied
because of insufficient buffering
• Frame error rate of an incoming phYSical connection to
the MAC
• Load on the ring based on the number of tokens received and the ring latency
• Ring latency
• Lost frames
The size of these counters has been selected to keep the
frequency of overflow small, even under. worst case operating conditions.
3.6 MANAGEMENT SERVICES
The BMAC device provides management services to the
Host System via the Control Bus Interface. This interface
allows access to internal registers to control and configure
the BMAC device.

3.2 MAC ADDRESSING SUPPORT
Both long (4B-bit) and short (16-bit) addressing are supported simultaneously, for both Individual and Group addresses.
Up to 12B contiguous programmable group addresses and
up to 15 Fixed Group Addresses plus the universal/broadcast address are recognized. Limited operation with null addresses is supported. An interface to external address
matching logic is provided to augment the Ring Engine's
addressing capabilities.
.

3.7 RING PARAMETER TUNING
The BMAC device includes settable parameters to allow
tuning of the network to increase performance over a large
range of network sizes.
The BMAC device supports systems of two stations with
little cable between them to ring configurations much larger
than the 1000 physical attachments and/or 200 km distance that are specified as the default values in the standard.
The BMAC device also handles frames larger than the 4500
byte default maximum frame size as specified in the Standard.

3.3 MAC BRIDGING SUPPORT
Several features are provided to aid in Bridging applications.
On the receive side, external address matching logic can be
used to examine the PH_Indicate byte stream to decide
whether to copy a frame, how to set the control indicators
and how to increment the counters.
On the transmit side, transparency options are provided on
the Source Address, the most significant bit of the Source
Address, and the FCS.

3.8 MULTI-FRAME STREAMING INTERFACE
The BMAC device provides an interface to support a multiframe streaming interface. Multiple frames can be transmitted after a token is captured within the limits of the token
timer thresholds.

In addition, support for an alternate Void stripping mechanism provides maximal flexibility in the generation of frames.
3.4 MAC SERVICE CLASS SUPPORT
All of the FOOl MAC service classes are supported by the
BMAC device. These include the Synchronous, Asynchronous, Restricted Asynchronous, and Immediate service
classes.
For Synchronous transmission, one or more frames are
transmitted in accordance with the station's synchronous
bandwidth allocation.
For Asynchronous transmission, one programmable asynchronous priority threshold is supported in addition to the
threshold at the Negotiated Target Token Rotation time.
For Restricted Asynchronous transmission, support is provided to begin, continue and end restricted dialogues.
For Immediate transmissions, support is provided to send
frames from either the Oata, Beacon or Claim states and
either ignore or respond to the received byte stream. After
an immediate transmission a token may optionally be issued.

3.9 GENERATES BEACON, CLAIM,
AND VOID FRAMES INTERNALLY
For purposes of transient token and ring recovery, no processor intervention is required. The BMAC device automatically generates the appropriate MAC frames.
3.10 SELF TESTING
Because the BMAC device is full duplex, loopback testing is
possible before entering the ring and during normal ring operation.
There are several posible loopback paths:
• internal to the BMAC device
• through the PLAYER device(s) using the PLAYER device
configuration switch
• through the CRO device.
These paths allow error isolation down to the device level.
The BMAC device also supports through parity.

3.5 DIAGNOSTIC COUNTERS
The BMAC device includes a number of diagnostic counters
that monitor ring and station performance.

2-136

c

-a
co
Co)

4.0 FOOl MAC Facilities
4.1 SYMBOL SET

4.2 PROTOCOL DATA UNITS

The Ring Engine recognizes and generates a set of sym·
bois. These symbols are used to convey Une States (such
as the Idle Une State), Control Sequences (such as the
Starting and Ending Delimiters) and Data.
Additional information regarding the symbol set can be
found in the FDDI PHY Standard.

The Ring Engine recognizes and generates two types of
Protocol Data Units (PDUs): Tokens and Frames.
The Token is used to control access to the ring. Only the
station that has captured the token has the right to transmit
new information. The format of a token is shown in Figure
4·1.

The Ring Engine expects that the Starting Delimiter will al·
ways be conveyed on an even symbol pair boundary. Fol·
lowing the starting delimiter, data symbols should always
come in matched pairs. Similarly the Ending Delimiter
should always come in one or more matched symbol pairs.

FIGURE 4-1. Token Format
Frames are used to pass information between stations. The
format of a frame is shown in Figure 4·2 with the field defini·
tions in Table 4·2.

The symbol pairs conveyed at the PHY Interface are shown
in Table 4·1.

FIGURE 4-2. Frame Format
TABLE 4-1. Symbol Pair Set
Type

Symbols

Starting Delimiter

JK

Ending Delimiter

TT orTR orTS or nT

Frame Status

RR orRS orSR orSS

Idle

II or nl

Data Pair

nn

Note: n represents any data symbol (O-F).
Symbol pairs others than the defined symbols are treated as code violations.
Section 7.2 has additional information on the symbol pairs generated and interpreted by the Ring Engine.

TABLE 4-2. PDU Fields
Name

Description

SFS

Start of Frame Sequence

Size

PA

Preamble

8 or More Idle Symbol Pairs

SD

Starting Delimiter

JK Symbol Pair

FC

Frame Control Field

1 Data Symbol Pair

DA

Destination Address

2 or 6 Symbol Pairs
2 or 6 Symbol Pairs

SA

Source Address

INFO

Information Field

FCS

Frame Check Sequence

EFS

End of Frame Sequence

ED

Ending Delimiter

At Least 1T Symbol for Frames;
At Least 2T Symbols for Tokens

FS

Frame Status

3 or More R or S Symbols

2·137

4 Symbol Pairs

N

....

Q)

....
~

CO)

CD

a.
Q

4.0 FDDI MAC Facilities (Continued)
TABLE 4-4. MAC/SMT Frames Types

4.2.1 PDU Fields
Start of Frame. Sequence

CLFF

rZZZ

PDUType

The Start of Frame Sequence (SFS) consists of the Preamble (PA) followed by the Starting Delimiter (SD).

1000

0000

Non-Restricted Token

1100

0000

Restricted Token

OLOO

0000

Void Frame

OLOO

0001 to
1110

SMTFrame

OLOO

1111

SMT Next Station
Addressing Frame

1LOO

·0001

Other MAC Frame

1LOO

0010

MAC Beacon Frame

1LOO

0011

MAC Claim Frame

1LOO

0100 to
1111

Other MAC Frame

The Preamble is.a sequence of zero or more Idle symbols
that is used to separate the PDUs. The Ring Engine Receiver can process and repeat a frame or token with no preamble. The Ring Engine Transmitter generates frames with at
least 8 bytes of preamble. The Ring Engine Transmitter also
guarantees that valid FDDI frames will never be transmitted
with more than 40 bytes of preamble.
The Starting Delimiter is used to indicate the start of a new
PDU. The Starting Delimiter is the JK symbol pair.
The Ring Engine expects the Starting Delimiter to be conveyed across the PH_Indication Interface as a single byte.
Similarly, the Ring Engine only generates Starting Delimiters
aligned to the byte boundary.
Frame Control
The Frame Control (FC) field is used to discriminate PDUs.
For tokens, the FC field identifies Restricted and Non-restricted tokens. For frames, the FC field identifies the frame
types and format and how the frame is to be processed.

Destination Address
The Destination Address (DA) field is used to specify the
station(s) that should receive and process the frame.
The DA can be an Individual or Group address. This is determined by the Most Significant Bit of the DA (DAIG).
When DAIG is 0 the DA is an Individual Address, when
DA.lG is 1 the DA is a Group Address. The Broadcast/Universal address is a Group Address.

The one byte FC field is form~tted as shown in Figure 4-3.
IclLIFFlrltzzl
FIGURE 4-3. Frame Control Field
The C (Class) bit specifies the MAC Service Class as Asynchronous (C = 0) or Synchronous (C == 1).

The DA field can be a Long or Short Address. This is determined by the L bit in the FC field (FC.L). If FC.L is 1, the DA
is a 48-bit Long Address. If FC.L is 0, the DA is a 16-bit
Short Address.

The L (Length) bit specifies the length of the MAC Address
as Short (L = 0) or Long (L = 1). A Short Address is a 16bit address. A Long Addres.s is a 48-bit address.

The Ring Engine maintains both a 16-bit Individual Address,
My Short Address (MSA) and a 48·bit Individual Address,
My Long Address (MLA).

The FF (Format) bits specify the PDU types as shown in
Table 4-3.
The r (Reserved) bit is currently not specified and sh'ould
always be transmitted as Zero (Exception: SMT NSA
Frames).
.

On the receive side, if DAIG is 0 the incoming DA is com·
pared with MLA (if FC.L = 1) or MSA (if FC.L = 0). If the
received DA matches MLA or MSA the frame is intended for
this station and the address recognized flag (A....Flag) is set.
If DAIG is 1, the DA is a Group Address and is compared
with the set of Group Addresses recognized by the Ring
Engine. If a match occurs the address recognized flag
(A....Flag) is set. The A....Flag is used by system interface logic as part of the criteria (with FC.L, DAIG and
M_Flag) to determine whether or not to copy the frame. If
the A....flag is set, the system interface will normally attempt
to copy the frame.

The ZZZ (Control) b.its are used in conjunction with the C
and FF bits to specify the type of PDUs. These bits may be
used to affect protocol processing criteria such as the Priority, Protocol Class, Status Handling, etc.
TABLE 4-3. Frame Control Format Bits
FC.FF

PDUTypes

0

0

SMT/MAC

0

1

LLC

1

0

Reserved for Implementer

1

1

Reserved for Future Standardization

On the transmit side, the DA is provided by the system interface logic as part of the data stream. The length of the
address to be transmitted is determined by the L bit of the
.FC field. (The FC field is also passed in the data stream.)
The Destination Address can be an Individual, Group, or
Broadcast Address.

When the Frame Control Format bits (FG.FFJ indicate a
SMT or MAC PDU, the frame type is identified as shown in
Table 4-4.
.

Source Address
The Source Address (SA) field is used to specify the ad·
dress of the station that originally transmitted the frame.

2-138

C

4.0 FOOl MAC Facilities

."

co

(Continued)

(0)

N

End of Frame Sequence

The Source Address has the same length as the Destination
Address (i.e., if the DA is a 16-bit Address, the SA is a 16-bit
Address; if the DA is a 4B-bit Address, the SA is a 48-bit
Address).
On the receive side, the incoming SA is compared with either MSA or MLA. If a match occurs between the incoming
SA and this station's MLA or MSA, the M_Flag is set. This
flag is used to indicate that the frame is recognized as having been transmitted by this station and is stripped. The
most significant bit of the SA (SA.IG) is not evaluated in the
comparison.

The End of Frame Sequence (EFS) always begins with a T
symbol and should always contain an even number of symbols. For Tokens an additional T symbol is added. For
frames the Ending Delimiter (ED) is followed by one or more
Frame Status Indicators (FS).
The Frame Status (FS) field is used to indicate the status of
the frame. The FS field consists of three Indicators: Error
Detected (E), Address Recognized (A), and Frame Copied
(C). These Indicators are created and modified as specified
in the Standard.
For frames transmitted by the Ring Engine, the E, A and C
Indicators are appended to all frames and are transmitted
as R symbols. No provisions are made to generate additional trailing control indicators.

On the transmit side, the station's individual address is
transmitted as the SA. Since the SA field is normally used
for stripping frames from the ring, the SA stored by the Ring
Engine normally replaces the SA from the data stream. The
length of the address to be transmitted is determined by the
L bit of the FC field. (The FC field is passed in the data
stream.) The most significant bit of the SA (SA.IG) is normally transmitted as 0, independent of the value passed
through the data stream.

For frames repeated by the Ring Engine, the E, A and C
Indicators are handled as specified in the Standard. Additional trailing control indicators are repeated unmodified
provided they are properly aligned. See Section 5.5 for details on Frame Status Processing.

As a transmission option, the SA may also be transmitted
transparently from the data stream. When the SA Transparency option is used, an alternate stripping mechanism is
necessary to remove these frames from the ring. (The Ring
Engine provides a Void Stripping Option. See Section
7.4.2.4 for futher information.)
As a separate and independent transmission option, the
MSB of the SA may also be transmitted transparently from
the data stream. This is useful for end stations participating
in the Source Routing protocol.

4.2.2 Token Formats
The Ring Engine supports non-restricted and restricted Tokens. See Figures 4-4 and 4-5.

FIGURE 4-4. Non-Restricted Token Format

Information
The Information field (Info) contains the Service Data Unit
(SDU). A SDU is the unit of data transfer between peer users of the MAC data service (SMT, LLC, etc). There is no
INFO field in a Token.

SFS

FC

SD

CO

FIGURE 4-5. Restricted Token Format
Non-Restricted
A non-restricted token is used for synchronous and non-restricted asynchronous transmissions.
Each time the non-restricted token arrives, a station is permitted to transmit one or more frames in accordance with its
synchronous bandwidth allocation regardless of the status
of the token (late or early).

The INFO field contains zero or more bytes.
On the receive side, the INFO field is checked to ensure
that it has at least the minimum length for the frame type
and contains an even number of symbols, as required by the
Standard.
The first 4 bytes of the INFO field of MAC frames (e.g., MAC
Beacon or MAC Claim) are stored in an internal register and
compared against the INFO field of the next MAC frame. If
the data of the two frames match, the Samelnfo signal is
generated. This signal may be used to copy MAC frames
only when new information is present.

Asynchronous transmissions occur only if the token is early
(usable token) and the Token Holding Timer has not
reached the selected threshold.
Restricted
A restricted token is used for synchronous and restricted
asynchronous transmissions only.
A station which initiates the restricted dialogue captures a
non-restricted token and releases a restricted token. Stations that participate in the restricted dialogue are allowed
to capture the restricted token. A station ends the restricted
dialogue by capturing the restricted token and releasing a
non-restricted token.

On the transmit side, the Ring Engine does not limit the
maximum size of the INFO field, but it does insure that
frames are transmitted with a valid DA and SA.
Frame Check Sequence
The Frame Check Sequence (FCS) is a 32-bit Cyclic Redundancy Check that is used to check for data corruption in
frames. There is no FCS field in a Token.
On the receive side, the Ring Engine checks the FCS to
determine whether the frame is valid or corrupted.
On the transmit side, the FCS field is appended to the end
of the INFO field. As a transmission option, appending the
FCS to the frame can be inhibited (FCS Transparency).

4.2.3 Frame Formats
The Ring Engine supports all of the frame formats permitted
by the FDDI standard. All frame types may be created external to the BMAC device and be passed through the MAC
Request Interface to the Ring. The BMAC device also has
the ability to generate Void, Beacon and Claim frames internally.

2-139

c»
.....

4.0 FOOl MAC Facilities (Continued)
Frames Generated by the Ring Engine
The Ring Engine generates and. detects several frames in
order to attain and maintain an operational ring.

Frames Generated Externally
The Ring Engine transmits frames passed to it from the System Interface. The data portion of the frame is created by
the System Interface. This begins with the FC field and ends
with the last byte of the INFO field. The FC field is passed
transparently to the ring. The length bit in the FC field is
used to determine the length of the transmitted addresses.
The data is passed as a byte stream across the MAC Request Interface as shown in Table 4-5.
Before the frame is transmitted, the Ring Engine inserts the
Start of Frame Sequence with at least 8 bytes of Preamble
but no more than 40 bytes of Preamble. The starting delimiter is transmitted as a JK symbol pair. The Source Address
is normally transmitted by the Ring Engine since it uses the
Source Address to strip the frame from the ring. This can be
overridden by using the Source Address transparency capability. Similarly, the Frame Check Sequence (4 bytes) is normally transmitted by the Ring Engine. This can be overridden with the FCS transparency capability. With FCS transparency, the FCS is transmitted from the data stream. The
End of Frame Sequence is always transmitted by the Ring
Engine as TR RR.
Frames transmitted by the Ring Engine must have a valid
DA and SA field. If the end of a frame is reached before a
valid length is transmitted, the frame will be aborted and a
Void frame will be transmitted.

Void Frames
Void frames are used during normal operation. The Ring
Engine generates two types of void frames: regular Void
frames and My_Void frames. See Table 4-S.
If short addressing is enabled, Void frames with the short
address are transmitted, otherwise Void frames with the
long address are transmitted.
Void frames are transmitted in order to reset the Valid
Transmission timers (TVX) in other stations in order to eliminate an unnecessary entry to the Claim state. Stations are
not required to copy Void frames. Void frames are transmitted by the Ring Engine in two situations:
1. While holding a token when no data is ready to be transmitted.
2. After a frame transmission is aborted.
My_Void frames are transmitted by the Ring Engine in
three situations:
1. After a request to measure the Ring Latency has been·
made when the next early token is captured.
2. After this station wins the Claim Process before the token
is issued.
3. After a frame has been transmitted with the STRIP option
before the token for that service opportunity is issued.
Void frames are also detected by the Ring Engine. A Void
frame with a Source Address other than MSA or MLA is
considered an Other_Void frame.

TABLE 4-5. Frame Formats
Field

Size

PA

:0:8; S:40

SD

1

FC

1

FC

FC

DA

20rS

DA

DA

SA

2 orS

SA

MSA,MLA,
or SA

INFO

:0:0

INFO

INFO

FCS

4 if Present

FCS

FCS

ED

1

TR

FS

1

RR

MLRequest

PH_Request
Idle Pairs
JK

Claim Frames
Claim frames are generated continuously with minimum preamble while the Ring Engine is in the Transmit Claim state.
The format of Claim frames generated by the Ring Engine is
shown in Table 4-7. When long addressing is enabled,
frames with the long address are transmitted, otherwise
frames with the short address are transmitted.
The Ring Engine detects reception of valid Claim frames. A
comparison is performed between the (first) four bytes of
the received INFO field and TREQ in order to distinguish
Higher_Claim, Lower_Claim, and My_Claim. Details are
given in Appendix A.

TABLE 4-6. Void Frames
Type

Enable

Size

SFS

FC

DA

FCS

EFS

MSA

FCS

TRRR

MLA

FCS

TRRR

MSA

MSA

FCS

TRRR

MLA

MLA

FCS

TRRR

Void

ESA

Short

PA

SD

40

Null

Void'

NotESA

Long

PA

SD

00

Null

My_Void

ESA

Short

PA

SD

40

My_Void

NotESA

Long

PA

SD

00

SA

TABLE 4-7. Claim Frames
Type

Enable

Size

My_Claim

NotELA

Short

PA

My_Claim

ELA

Long

PA

FC

DA

SA

INFO

FCS

EFS

SD

83

MSA

MSA

TREQ

FCS

TRRR

SD

C3

MLA

MLA

TREQ

FCS

TRRR

SFS

I
I

2-140

C

"'CJ

4.0 FOOl MAC Facilities (Continued)
4.3.3 Lost Frame Count
The Lost Frame Count (LFCn is specified in the FDDI MAC
Standard, and is the count of all instances where a format
error is detected in a frame or token such that the credibility
of PDU reception is placed in doubt. The Lost Frame Count
is incremented when any symbol other than data or Idle
symbols are received between the Starting and Ending Del·
imiters of a PDU (this includes parity errors).

Beacon Frames
Beacon frames are transmitted continuously with minimum
preamble when the Ring Engine is in the Transmit Beacon
state. The format of Beacon frames generated by the Ring
Engine is shown in Table 4·8. When long addressing is en·
abled, frames with the long address are transmitted, other·
wise frames with the short address are transmitted.
When the Transmit Beacon State is entered from the Trans·
mit Claim State the first byte of the 4 byte TBT Field is
transmitted as Zero.
Beacon frames that require alternative formats such as Di·
rected Beacons must be generated externally.
The Ring Engine detects reception of valid Beacon frames
and distinguishes between Beacon frames transmitted by
this MAC (My_Beacon) and Beacon frames transmitted by
other stations (Other_Beacon). Details are given in Appen·
dix A.

4.3.5 Frames Not Copied Count
The Frames Not Copied Count (FNCT) is specified in the
FDDI MAC·2 Standard, and is the count of frames intended
for this station that were not successfully copied by this
station. The count is incremented when an internal or exter·
nal (when Option.EMIND is enabled) Destination Address
match occurs, no errors were detected in the frame, and the
frame was not successfully copied (VCOPY = 0). This
count is an indication of insufficient buffering or frame pro·
cessing capability for frames addressed to the station. MAC
frames, Void frames and NSA frames received with the A
indicator set are not included in this count.

The size of the counters has been chosen such that minimal
software intervention is required, even under marginal oper·
ating conditions.
The following counts are maintained by the Ring Engine:
Frame Received
Error Isolated
Lost Frame
Frames Copied
Frames Not Copied
Frames Transmitted

4.3.6 Frames TransmItted Count
The Frames Transmitted Count (FTCn is specified in the
FDDI MAC·2 Standard, and is incremented every time a
complete frame is transmitted from the MAC Request Interface. The count is provided as an aid to accumulate station
performance statistics. Void and MAC frames generated by
the Ring Engine are not included in the count.

4.3.1 Frame Received Count
The Frame Received Count (FRCT) is specified in the FDDI
MAC Standard, and is the count of all complete frames reo
ceived. This count includes frames stripped by this station.

4.4 TIMERS

4.4.1 Token Rotation Timer

4.3.2 Error Isolated Count
The Error Isolated Count (EICT) is specified in the FDDI
MAC Standard, and is the count of error frames detected by
this station and no previous station. It increments when:

The Token Rotation Timer (TRn times token rotations from
arrival to arrival. TRT is used to control ring scheduling duro
ing normal operation and to detect and recover from serious
ring error situations.

1. An FCS error is detected and the received Error Indicator
(Er) is not equal to S.
2. A frame of invalid length (I.e., off boundary T) is received
and Er is not equal to S.
3. Er is not R or S.

TRT is loaded with the maximum token rotation time, TMAX,
when the ring is not operational. TRT is loaded with the
negotiated Target Token Rotation Time, TNEG, when the
ring is operational.

TABLE 4-8. Beacon Frames
Type

Enable

Size

My_Beacon

NotELA

Short

PA

My_Beacon

ELA

Long

PA

m
.....

4.3.4 Frame Copied Count
The Frames Copied Count (FCCn is specified in the FDDI
MAC·2 Standard, and is the count of the number of frames
copied by this station. The count is incremented when an
internal or external match occurs (when Option.EMIND is
enabled) on the Destination Address, no errors were detect·
ed in the frame and the frame was successfully copied
(VCOPY = 1). This can be used to accumulate station per·
formance statistics. Frames copied promiscuously, MAC
frames, Void frames and NSA frames received with the A
indicator set are not included in this count.

4.3 FRAME COUNTS
To aid in fault isolation and to enhance the management
capabilities of a ring, the Ring Engine maintains several
frame counts. The Error and Isolated frame counts incre·
ment when a frame is received with one or more errors that
were previously undetected. The Ring Engine then corrects
the error such that a downstream station will not increment
its count.

FRCT
EICT
LFCT
FCCT
FNCT
FTCT

co
~

SFS

I
I

FC

DA

SA

SD

82

Null

MSA

SD

C2

Null

MLA

2·141

INFO

FCS

EFS

TBT

FCS

TRRR

TBT

FCS

TRRR

fII

~

CD
C\I

CO)

CO

a.
Q

r----------------------------------------------------------------------------------------------,
4.0 FOOl MAC Facilities (Continued)
The Latency Counter increments every 16 byte times
(1.28 its) and is used to measure ring latencies up to
1.3421772 seconds directly with an accuracy of 1.2 its. No
overflow or increment event is provided with this counter.

4.4.2 Token Holding Timer
The Token Holding timer (THT) is used to limit the amount
of ring bandwidth used by a station for asynchronous traffic
once the token is captured. THT is used to determine if the
captured token is (still) usable for asynchronous transmis·
sion. A token is usable for asynchronous traffic if THT has
not reached the selected threshold. Two asynchronous
thresholds are supported; one that is fixed at the Negotiated
Target Token Rotation Time (TNEG), and one that is pro·
grammable at one of 16 Asynchronous Priority Thresholds.
Requests to transmit frames at one of the priority thresholds
are serviced when the Token Holding Timer (THT) has not
reached the selected threshold.

4.5 RING SCHEDULING
FDDI uses a timed token protocol to schedule the use of the
ring. The protocol measures load on the network by timing
the rotation of the token. The longer the token rotation time
the greater the instantaneous load on the network. By limit·
ing the transmission of data when the token rotation time
exceeds a target rotation time, a maximum average token
rotation time is realized. The protocol is used to provide
different classes of service.
Multiple classes of service can be accommodated by setting
different target token rotation times for each class of service.
The Ring Engine supports Synchronous, Non-Restricted
Asynchronous, Restricted Asynchronous, and Immediate
service classes. The Immediate service class is supported
when the ring is non-operational; the other classes are supported when the ring is operational.

4.4.3 Late Count
The Late Count (LTCT) is implemented differently than sug·
gested by the Standard, but provides similar information.
The function of the Late Count is divided beween the Late_
Flag that is equivalent to the standard Late Count with a
non·zero value and a separate counter. Late Flag is main·
tained by the Ring Engine to indicate if it is possible to send
asynchronous traffic. When the ring is operational, Late
Count indicates the time it took the ring to recover the last
time the ring went non·operational. When the ring is non·op·
erational, Late Count indicates the time it has taken (so far)
to recover the ring.
'

4.5.1 Synchronous Service Class
The Synchronous service class may be used to guarantee a
maximum response time (2 times TIRT), minimum bandwidth, or both.
Each time the token arrives, a station is permitted to transmit one or more frames in accordance with its synchronous
bandwidth allocation regardless of the status of the token
(late or early; Restricted or Non-Restricted).
Since the Ring Engine does not provide a mechanism for
monitoring a station's synchronous bandwidth ,utilization,
the user must insure that no synchronous request requires
more than the allocated bandwidth.

The Late Count is incremented every time TRT expires
while the ring is non·operational and Late_Flag is set (once
every TMAX).
The Late Count is provided to assist Station Management,
SMT, in the isolation of serious ring errors. In many situa·
tions the ring will recover very quickly and late count will bel
of marginal utility. However in the case of serious ring er·
rors, it is helpful for SMT to know how long it has been since
the ring went non·operational (with TMAX resolution) in or·
der to determine if it is necessary to invoke recovery proce·
dures. When the ring goes no operational there is no way to
know how long it will stay non·operational, therefore a timer
is necessary. If the Late Count were not provided, SMT
would be forced to start a timer every time the ring goes
non·operational even though it may seldom be used. By us·
ing the provided Late Count, an SMT implementation may
be able to alleviate this additional overhead.

To help ensure that synchronous bandwidth is properly allocated after ring configuration, synchronous requests are not
serviced after a Beacon frame is received. After a major
reconfiguration has occurred, management software must
intervene to verify or modify the current synchronous bandwidth allocation.
4.5.2 Non-Restricted Asynchronous Service Class
The Non-Restricted Asynchronous service class is typically
used with interactive and background trafiic. Non-restricted
Asynchronous requests are serviced only if the token is early and the Token Holding Timer has not reached the selected threshold.

4.4.4 Valid Transmission Timer
The Valid Transmission Timer (TVX) is reset every time a
valid PDU is received. TVX is used to increase the respon·
siveness of the ring to errors. Expiration of the TVX indio
cates that no PDU has been received within the timeout
period and causes the Transmitter to invoke the recovery
Claim Process.

Asynchronous service is available at two priority thresholds,
the Negotiated Target Token Rotation Time plus one programmable threshold. Managemef!t software may use the
priority thresholds to discriminate additional classes of traffic based on current loading characteristics of the ring. The
priority thresholds may be determined using the current
TIRT and the Ring Latency. In this case, application software is only concerned with the priority level of a request.

4.4.5 Token Received Count
The Token Received Count (TKCT) is incremented every
time a valid token arrives. The Token Count can be used
with the Ring Latency Count to calculate the average net·
work load over a period of time. The frequency of token
arrival is inversely related to the network load.

As an option, Asynchronous Requests may be serviced with
THT disabled. This is useful when it is necessary to guarantee that a multi-frame request will be serviced on a single
ioken opportuniiy. Because of ihe possibiiiiy of causing laie
tokens, this capability should be used with caution, and
should only be allowed when absolutely necessary.

4.4.6 Ring Latency Count
The Ring Latency Count (RLCT) is a measurement of time
for PDUs to propagate around the ring. This counter con·
tains the last measured ring latency whenever the Ring La·
tency Valid bit of the Token Event Register (TELR.RLVLD)
is one.
2-142

C

"tJ

4.0 fOOl MAC Facilities (Continued)

co

Co)

4.5.3 Restricted Asynchronous Service Class

Immediate requests are only serviced when the ring is nonoperational. Immediate requests may be serviced from the
Transmitter Data, Claim, and Beacon states Options are
available to force the Ring Engine to enter the Claim or
Beacon state, to prohibit it from entering the Claim state, or
to remain in the Claim state when receiving My_Claim.
On the completion of an Immediate request, a Token (Nonrestricted or Restricted) may optionally be issued. Immediate requests may also be used in non-standard applications
such as a full duplex point to point link.

The Restricted Asynchronous service class is useful for
large transfers requiring all of the available Asynchronous
bandwidth. The Restricted Token service is useful for large
transfers requiring all of the available (remaining) asynchronous bandwidth.
The Restricted Token service may also be used for operations requiring instantaneous allocation of the remaining
synchronous bandwidth when Restricted Requests are
serviced with THT disabled. This is useful when it is necessary to guarantee atomicity, i.e., that a multi-frame request
will be serviced on a single token opportunity.
A Restricted dialogue consists of three phases:
1. Initiation of a Restricted dialogue:
o Capture a Non-Restricted Token

5.0 Functional Description
5.1 TOKEN HANDLING
5.1.1 Token Timing Logic
The FDDI Ring operates based on the Timed Token Rotation protocol where all stations on the ring negotiate on the
maximum time that the stations have to wait before being
able to transmit frames. This value is termed the Negotiated
Target Token Rotation Time (nRn. The nRT value is
stored in the TNEG Register.

o Transmit zero or more frames to establish a Restricted

dialogue with other stations
o Issue a Restricted Token to allow other stations in the

dialogue to transmit frames
2. Continuation of a Restricted dialogue:
o Capture a Restricted Token

Stations negotiate for nRT based on their TREQ that is
aSSigned to them upon initialization.

o Transmit zero or more frames to continue the Restricto

Each station keeps track of the token arrival by setting the
Token Rotation Timer (TRT) to the nRT value. If the token
is not received within nRT (the token is late), the event is
recorded by setting the Late_Flag. If the token is not received within twice nRT (TRT expires and Late_Fiag is
set), there is a potential problem in the ring and the recovery
process is invoked.

ed dialogue
Issue a Restricted Token to allow other stations in the
dialogue to transmit frames

3. Termination of a Restricted dialogue:
o Capture a Restricted Token
o Transmit zero or more frames to continue the Restrict-

ed dialogue

Furthermore, the Token Holding Timer (THT) is used to limit
the amount of ring bandwidth used by a station for Asynchronous traffic once the token is captured. Asynchronous
traffic is prioritized based on the Late_Flag which denotes
a threshold at nRT and an additional Asynchronous Priority Threshold (THSH). The Asynchronous Threshold comparison (Apri 1) is pipe lined, so a threshold crossing may not
be detected immediately; however, the possible error is a
fraction of the precision of the threshold values.

o Issue a Non-restricted Token to return to the Non-re-

stricted service class
Initiation of a Restricted dialogue will prevent all Non-restricted Asynchronous traffic throughout the ring for the duration of the dialogue, but will not affect Synchronous traffic.
To ensure that the Restricted traffic is operating properly, it
is possible to monitor the use of Restricted Tokens on the
ring. When a Restricted Token is received, the event is
latched and under program control may generate an interrupt. In addition, a request to begin a Restricted dialogue
will only be honored if both the previous transmitted Token
and the current received Token were Non-restricted tokens.
This is to ensure that the upper bound on the presence of a
Restricted dialogue in the ring is limited to a single dialogue.

The Token Timing Logic consists of two Timers, TRT and
THT, in addition to the TMAX and TNEG values loaded into
these counters (See Figure 5-1).
The Timers are implemented as count-up counters that increment every 80 ns. The Timers are reset by loading TNEG
or TMAX into the counters where TNEG and TMAX are unsigned twos complement numbers. This allows a Carry flag
to denote timer expiration.
On an early token arrival (Late_Flag is not set), TRT is
loaded with TNEG and counts up. On a late token arrival
(Late_Flag is set), Late_Flag is cleared and TRT continues to count. When TRT expires and Late_Flag is not set,
Late_Flag is set and TRT is loaded with TNEG.
THT follows the value of TRT until a token is captured.
When a token is captured, TRT may be reloaded with TNEG
while THT continues to count from its previous value (THT
does not wrap around). THT increments when enabled. THT
is disabled during synchronous transmission and a special
class of asynchronous transmission. THT is used to determine if the token is usable for asynchronous requests.

As suggested by the MAC-2 Draft standard, to help ensure
that only one Restricted dialogue will be in progress at any
given time, Restricted Requests are not serviced after a
MAC frame is received until Restricted Requests are explicitly enabled by management software. Since the Claim Process results in the generation of a Non-restricted Token,
this prevents stations from initiating another restricted dialogue without the intervention of management software.
4.5.4 Immediate Service Class
The Immediate service class facilitates several non-standard applications and is useful in ring failure recovery (e.g.,
Transmission of Directed Beacons). Certain ring failures
may cause the ring to be unusable for normal traffic, until
the failure is remedied.

2-143

N
CD

....

,..

re

C')

~

C

5.0 Functional Description (Continued)
~----~
THEG

I

-"
I I
~TE
FLAG

ASYNCHRONOUS
THRESHOLD

~

"

~

I

I

TMAX

~

~ RING OPERATIONAL

TRT

+

I

THT

+

COIAPARISON LOGIC

I

I

TRT LOAD

c:

THT LOAD
THT ENABLE

/
USEABLE TOKEN

TL/F/103B7-3

FIGURE 5-1. Token Timing Logic

It TRT expires while Late_Flag is set, TRT is loaded with
TMAX and the recovery process (Claim) is invoked. When
TRT expires and the ring is not operational, TRT is loaded
with TMAX. TRT is also loaded with TMAX on a MAC Reset.

own Beacon frame. That station then enters the Claim Process, to re·initialize the ring.
5.2 SERVICING TRANSMISSION REQUESTS
A Request to transmit one or more frames is serviced by the
Ring Engine. After a Request is submitted to the Ring Engine, the Ring Engine awaits an appropriate Service Opportunity in which to service the Request. Frames associated
with the Request are transmitted during the Service Opportunity. The definition of a Service Opportunity is different
depending on the operational state of the ring.

5.1.2 Token Recovery
While the ring is operational, every station in the ring uses
the Negotiated Target Token Rotation Time, TNEG. The
MAC implements the protocol for negotiation of this target
token rotation time (TTRT) through the Claim Process. The
shortest requested Token Rotation Time is used by all of
the stations in the ring as the TNEG.

A Service Opportunity begins when the criteria presented to
the Ring Engine are met. This criteria contains the requested service class (synch, asynch, asynch priority, immediate)
and the type of token to capture (restricted, non-restricted,
any, none).

If TRT expires with Late_Flag set, a token has not been
received within twice TTRT (Target Token Rotation Time). If
TVX (Valid Transmission Timer) expires, the station has not
received a valid token within TVX Max. Both these events
require token recovery and cause the Ring Engine to enter
the Claim Process.

During a service opportunity, the Ring Engine guarantees
that a valid frame is sent with at most 40 bytes of preamble.
When data is not ready to be transmitted, Void frames are
transmitted to reset the TVX timers in all stations. During an
immediate request while in the Claim or Beacon States,
when no Claim or Beacon frames are ready to be transmitted, the internally generated Claim or Beacon frames are
transmitted.

In the Claim Process a MAC continuously transmits Claim
frames containing TREQ. Should the MAC receive a Claim
frame with a shorter TREQ (larger value-Higher_Claim) it
leaves the Claim State. A station that receives its own Claim
frame gains the right to send the first token and make the
ring operational again. If the Claim Process does not complete successfully, TRT will expire and the Beacon Process
is invoked.

5.2.1 Service Opportunity While Ring Operational
Beginning of Service Opportunity

The Beacon Process is used for fault isolation. A station
may invoke the Beacon Process through an SM_
Control.request(Beacon). When a station enters the Beacon
Process, it continuously sends out Beacon frames. The
Beacon Process is complete when a station receives its

Table 5-1 shows the conditions that must be true when a
valid token is received in order to begin a Service Opportunity when the ring is operational.

TABLE 5-1. Beginning of Service Opportunity
Requested
Service Class

Requested Token
Capture Class

Asynchronous Priority

non-restricted

THT> THSH
Late_Flag = 0
RinQ-Op = 1

non-restricted

Asynchronous

non-restricted

Late_Flag = 0
RinQ-Op = 1

non-restricted

Asynchronous

restricted

Late_Flag = 0
RinQ-Op = 1

restricted

Synchronous

any

Criteria

RinQ-Op
2·144

=1

Received
Token Class

any

.----------------------------------------------------------------------,0
"g

5.0 Functional Description

co

(Continued)
In addition to the criteria mentioned above, additional criteria apply to the servicing of Synchronous and Restricted
Requests.
• Synchronous Requests are not serviced if RELR.BCNR
is set (See Section 4.5.1).
• Restricted requests are not serviced when RELR.BCNR,
RELR.CLMR, or RELR.OTRMAC are set. (See Section
4.5.3).

Co)

transmitter Data, Claim or Beacon State, and the transmitter
is in the appropriate state.
The service opportunity continues until anyone of the following conditions exist:
1. No (additional) frames are to be sent
2. TMAX of time elapses on this request

N

en

-"

3. The transmitter exits the requested state
4. The ring becomes operational while servicing an immediate request

• Restricted Dialogues may only begin when a non-restricted token has been received and transmitted (See Section 4.5.3).

5.2.3 Frame Transmission
Frames associated with the current request may be transmitted at any time during a Service Opportunity. In many
applications, data is ready to be transmitted when the request is presented to the interface. Soon after the Service
Opportunity begins, frame transmission begins. In other applications in order to minimize the effects of ring latency it is
desirable to capture the token when no data is ready to be
transmitted. This capability results in wasted ring bandwidth
and should be used judiciously.
During transmission, a byte stream is passed from the System Interface to the MAC Request Interface. The data is
passed through the Ring Engine and appears at the PHY
Request Interface two byte times later.
While a frame is being transmitted, the request parameters
for the next request (if different) may be presented to the
interface. At the end of the current frame transmission, a
decision is made to continue or cancel the current service
opportunity based on the new request parameters.

End of Service Opportunity
The Service Opportunity continues until either a token is
issued or the ring becomes non-operational.
A token is issued after the current frame, if any, is transmitted when:
1. It is no longer necessary to hold the token
• All frames of all active requests have been transmitted
2. The token became unusable while servicing a request
• Asynchronous Priority threshold reached (If an Asynch
Priority Request is being serviced)
• THT expired (if enabled)
When the ring becomes non-operational the current frame
transmission is aborted. The ring may go non-operational
while holding a token as a result of anyone of the following
conditions:
• A MAC Reset
• Reception of a valid MAC frame
• TRT expiration, (TRT was reset when the token was captured)

During a transmission several errors can occur. A transmission may be terminated unsuccessfully because of external
buffering or interface parity errors, internal Ring Engine errors, a MAC reset, or reception of a MAC frame. When a
transmission is aborted due to an external error (and
Option.IRPT is not set), a Void frame is transmitted to reset
the TVX timers in all stations in the ring. When a frame is
aborted due to a transmission error, the Service Opportunity
is not automatically ended.

Issue Token Type
The criteria presented to the Ring Engine to begin a Service
Opportunity, also contains the Issue Token Class. The Issue
Token Class is used if servicing of that request was completed (the last frame of that request was transmitted), otherwise a token of the Capture Token Class is issued.

5.3 REQUEST SERVICE PARAMETERS

When servicing multiple requests on a single service opportunity, the Issue Token Class of the previous class becomes
the capture class for the next request for purposes of determining usability.
The type of token issued depends on the service class and
the type of token captured as shown in Table 5-2.

5.3.1 Request Service Class
The Request Service corresponds to the Request
Service Class and the token class parameters of the
(SM-lMA-DATA.request and (SM_)MA-Token.request
primitives as specified in the Standard.
14 useful combinations of the Requested Service Class
(Non-Restricted Asynchronous, Restricted Asynchronous,
Synchronous, Immediate), the Token Capture and Issue
Class, and THT Enable are supported by the Ring Engine as
shown in Table 5-3.

5.2.2 Service Opportunity while
Ring Not Operational
While the ring is not operational, a service opportunity occurs if an immediate transmission is requested from the

TABLE 5-2. Token Transmission Type
Service Class

Token Captured

Token Issued

Non-Restricted

Non-Restricted

Non-Restricted

Begin Restricted

Non-Restricted

Restricted

Continue Restricted

Restricted

Restricted

End Restricted

Restricted

Non-Restricted

Immediate

None

None

Immediate Non-Restricted

None

Non-Restricted

Immediate Restricted

None

Restricted

2-145

Ell

5.0 Functional Description (Continued)
TABLE 5-3. Request Service Classes
RQRCLS

Name

0000

None

None

0001

Apri_1

Async
THSH1

0010

Reserved

Reserved

0011

Reserved

Reserved

0100

Syn

Synch

0101

Imm

Immediate

THT

Token
Capture

Token
Issue

Enabled

Non-rstr

Non-rstr

Disabled

Any

Captured

1

Disabled

None

None

4

Class

Notes

0110

ImmN

Immediate

Disabled

None

Non-rstr

4

0111

ImmR

Immediate

Disabled

None

Rstr

4

Non-rstr

1000

Asyn

Asynch

Enabled

Non-rstr

1001

Rbeg

Restricted

Enabled

Non-rstr

Rstr

2,3

1010

Rend

Restricted

Enabled

Rstr

Non-rstr

2

1011

Rcnt

Restricted

Enabled

Rstr

Rstr

2

Non-rstr

1100

AsynD

Asynch

Disabled

Non-rstr

1101

RbeginD

Restricted

Disabled

Non-rstr

Rstr

2,3

1110

RenD

Restricted

Disabled

Rstr

Non-rstr

2

1111

RcntD

Restricted

Disabled

Rstr

Rstr

2

Note 1: Synchronous Requests are not serviced when bit BCNR of the Ring Event Latch Register is set.
Note 2: Restricted Requests are not serviced when bit BCNR, CLMR, or OTRMAC of the Ring Event Latch Register is set.
Note 3: Restricted Dialogues only begin when a Non-Restricted token has been received and transmitted.
Note 4: Immediate Requests are serviced when the ring is Non-Operational. These requests are serviced Irom the Data state H ne~her signal ROCLM nor ROBCN
is asserted. If signal ROCLM is asserted, Immediate Requests are serviced lrom the Claim State. II signal ROBCN is asserted, Immediate Requests are serviced
from the Beacon State. ROCLM and ROBCN do not cause transitions to the Claim and Beacon States.

Requests are serviced on a Service Opportunity meeting
the requested criteria.
External support is required to limit the requests presented
to the MAC Interface by different MAC Users (SMT, LLC,
etc.).
A Token Capture Class of non-rstr indicates that the Transmitter Token Class must be Non-Restricted to begin servicing the request. A Token Capture Class of rstr indicates
that the Transmitter Token Class must be Restricted to begin servicing the Request. A Token Issue Class of non-rstr
means that the Transmitter Token Class will be Non-Restricted upon completion of the request. A Token Issue
Class of rstr means that the Transmitter Token Class will be
Restricted upon completion of the request.

Source Address Transparency
Normally the SA field in a frame is generated by the BMAC
device, using either the MSA or MLA. When the SA Transparency option is selected, the SA from the data stream is
transmitted in place of the MSA or MLA. The SAT option
can be invoked on 'a per frame basis upon the assertion of
the SAT signal (Pin 12).

,

When the SA Transparency option is selected, it is necessary to rely on an alternate stripping mechanism because
stripping based on the returning SA only guarantees that
frames with MSA or MLA will be stripped. Either the Void
Stripping option (described below) may be invoked, or external hardware that forces stripping using the EM (External
M_Flag) Signal is required.
The MSB of the SA is not controlled by this option. It is
normally forced to Zero. It can be controlled using the
Source Address MSB Transparency option described below.
SA Transparency is possible for all frames (including MAC
frames). External support is required to limit the use of SA
Transparency to certain MAC Users. SA Transparency
should not be used with externally generated MAC Frames
in order to maintain accountability, but this is not enforced
by the Ring Engine.

5.3.2 Request Options
The Request Options provide the ability for Source Address
Transparency (SAT) and FCS Transparency (FCSn. In both
cases, data from the request stream is transmitted in place
of data from either the Ring Engine. The use of Source Ad·
dress transparency has no effect on the sequencing of the
interface. When Source Address transparency is not used,
the SA from the internal parameter RAM is substituted for
the SA bytes in the request stream, which must still be present. Since the FCS is appended to the frame, when FCS
transparency is not used, no FCS bytes are present in the
request stream.

2-146

5.0 Functional Description (Continued)
SA Transparency also overrides the Long and Short Addressing enables. For example, if Long Addressing is not
enabled, it is still possible to transmit frames with Long Addresses. Similarly, if Short Addressing is not enabled, it is
still possible to transmit Frames with Short Addresses. This
may be useful in full duplex point to point applications and
for diagnostic purposes.

Void Stripping is also automatically invoked by this station if
it wins the Claim Process before the initial token is issued.
This removes all fragments and ownerless frames from the
ring when the ring becomes operational.
FCS Transparency
Normally, the BMAC device generates and transmits the
FCS. When the Frame Check Sequence Transparency option is selected, the Ring Engine device does not append
the FCS to the end of the Information field. This option is
selected by asserting signal FCST (Pin 14).
The receiving stations treat the last four bytes of the data
stream as the FCS.
This option may be useful for end to end FCS coverage
when crossing FOOl bridges, for diagnostic purposes, or in
Implementer frames.

Source Address Most Significant Bit Transparency
With the Source Address MSB Transparency option, the
MSB of the SA is sourced from the data stream, as opposed
to being transmitted as Zero. The SA MSB Transparency
option is selected by asserting signal SAIGT (Pin 11).
Unless the Source Address Transparency option is also selected, the rest of the SA is generated by the Ring Engine.
The MSB of the SA is used to denote the presence of the
Routing Information Field used in Source Routing algorithms (as in the IEEE 802.5 protocol). This option is useful
for stations that utilize Source Routing. In these applications, the SA can still be generated by the Ring Engine,
even when routing information is inserted into the data
stream.

5.4 FRAME VALIDITY PROCESSING
A valid frame is a frame that meets the minimum length
criteria and contains an integral number of data symbol
pairs between the Starting and Ending Delimiters as shown
in Table 5-4.
On the Transmit side, frames are checked to see that they
are of a minimum length. If the end of a frame is reached
before a valid length is transmitted, the frame will be aborted and a Void frame will be transmitted (as with all aborted
frames). A MAC frame with a zero length INFO field will not
be aborted even though the Receiver will not recognize it as
a valid frame. Frame lengths are not checked for the maximum allowable length (4500 bytes).

Void Stripping
This option is useful for removing bridged and ownerless
frames and remnants (fragments) from the ring.
In the Void Stripping protocol, two My_Void frames are
transmitted at the end of a service opportunity. Stripping
continues until one of the following conditions occur:
• One My_Void frames returns (The Second My_Void
will be stripped on the basis of the SA)

Also on the Transmit side, the L bit in the FC field is
checked against the ESA and ELA bits in the Option Register (if the SA Transparency option is not selected) to insure
that a frame of that address length can be transmitted. If the
selected address length is not enabled, the frame is aborted
at the beginning of the SA field. If SA Transparency is selected, the frame is not aborted.

• A Token is received
• An Other_Void is received
• A MAC frame other than My_Claim is received
• A MAC Reset occurs
If any frame of a Service Opportunity requests this option,
then all frames on that service opportunity will be stripped
using this method. Void Stripping is invoked upon the assertion of the STRIP signal (Pin 13) at the beginning of a frame
transmission.

TABLE 5-4. Valid Frame Length
Frame Types

Short Address

Long Address

Notes

(Minimum Number of Bytes)

Void

9

17

MAC

13

21

Ineluding a 4 Byte
INFO Field

Non-MAC

9

17

Including a 0 Byte
INFO Field

2-147

....
CD

C'II

C')

CO

D.

C

5.0 Functional Description

(Continued)
The received value of the Control Indicators for every frame
received is reported at the MAC Indicate Interface on signals MID(7-0). On a frame transmitted by this station, the
returning Control Indicators give the transmission status.

5.5 FRAME STATUS PROCESSING

Each frame contains three or more Control Indicators. The
FDDI Standard specifies three: the E, A, and C Indicators.
When a frame is transmitted, the Control Indicators are
transmitted as R (Reset) symbols. If an error is detected by
a station that receives the frame, the E Indicator is changed
to an S (Set) symbol. If a station recognizes the DA of a
frame as its own address (Individual, Group or Broadcast),
the A Indicator is changed to an S symbol. If that station
then copies the frame, the C Indicator is changed to an S
symbol.

The Ending Delimiter followed by the Frame Status Indicators should begin and end on byte boundaries. Control Indicators are repeated until the first non R, S, or T is received.
The processing of properly aligned E, A, and C indicators by
the Ring Engine is detailed in Table 5-5. Given the shown
received Control Indicator values and the settings of the
internal flags, the noted control indicator values will be
transmitted.

TABLE 5-5. Control Indicators Processing
Flags

Received Indicators

Transmitted Indicators

E

A

C

E

A

Copy

N

E

A

R

R

R

0

0

X

X

R

R

S

R

R

R

0

1

0

X

R

S

R

R

R

R

0

1

1

X

R

S

S

X

R

R

1

X

X

X

S

R

R
S

C

R

R

S

0

0

X

X

R

R

R

R

S

0

1

a

X

R

S

R

R

R

S

0

1

1

X

R

S

S

X

R

S

1

X

X

X

S

R

S

R

S

R

0

X

X

1

R

S

R

R

S

R

0

X

0

0

R

S

R

R

S

R

0

1

1

0

R

S

S

R

S

R

0

0

X

X

R

S

R

R

S

S

0

X

X

X

R

S

S

X

S

S

1

X

X

X

S

S

S

R

R

T

0

0

X

X

R

R

T

R

R

T

0

1

a

X

R

S

R
S

R

R

T

0

1

1

X

R

S

X

R

T

1

X

X

X

S

R

T

R

S

T

0

1

1

0

R

S

S

R

S

T

0

0

X

X

R

S

T

R

S

T

0

1

0

X

R

S

R

R

S

T

0

1

1

1

R

S

R

S

T

1

X

X

X

S

S

T

X

E_Flag is set when the local FCS check fails or when the E Indicator is received as anything other than R.
A-Flag is the internal _Flag or the external A Flag (pin EA) when Option.Emind is set.
The Copy Flag is a one cycle delayed version of the VCOPY input.

N_Flag indicates that an NSA frame is being received. This signal is sampled at the same time that the received A indicator is being investigated.

X Represents a Don't Care Condition,

2-148

5.0 Functional Description

(Continued)

5.5.1 Odd Symbols Handling

A Higher_Claim frame is a Claim frame with a Source Ad·
dress that does not match this station address and the
T_Bid_Rc in the INFO field is greater than this station's
TREQ.

When the first T symbol of a frame is received as the second symbol of a symbol pair (the T symbol is received offboundary), the Ring Engine corrects this condition by send·
ing out the symbol sequence TSII. This symbol sequence
indicates the end of the frame and that an error has been
detected in the frame. Note that this is a low probability
error event.

A lower_Claim frame is a Claim frame with a Source Address that does not match this station address and the
T_Bid_Rc in the INFO field is less than this station's
TREQ.

Reception of symbols other than R, S, and T during the
Frame Status processing is also a low probability event.
This event is handled slightly differently on the first byte of
the Ending Frame Status.

Transmit
Claim frames are transmitted continuously while in the
Claim State.
Claim frames are generated by the Ring Engine, unless an
Immediate Claim Request is present at the MAC Request
Interface. Even if an Immediate Claim Request is present at
the MAC Request Interface, at least one Claim frame must
be generated by the Ring Engine before Claim frames from
the Interface are transmitted.

On the first byte of the Ending Frame Status, if the symbol
following the T symbol is not [R or Sl, the symbol sequence
TSII is transmitted and the error and frame counts are incre·
mented.
After the first byte of the Ending Frame Status, if either the
first symbol is not [R or S1 or the second symbol is not [R or
S or Tl, an Idle symbol pair (II) is transmitted.

For internally generated Claim frames, the Information field
is transmitted as the 4·byte Requested Target Token Rota·
tion Time.

5.6 SMT FRAME PROCESSING
All SMT frames are handled as all other frames with the
exception of the SMT Next Station Addressing (SMT NSA)
frame. NSA frames are used to announce this station's ad·
dress to the next addressed station. The current SMT protocol requires stations to periodically (at least once every 30
seconds) transmit an NSA frame. Since the Broadcast ad·
dress is used, and every station is required to recognize the
broadcast address, the downstream neighbor will set the A
Indicator. A station can determine its upstream neighbor by
finding NSA frames received with the A Indicator received
as R. By collecting this information from all stations, a map
of the logical ring can be built.

The Information field of a Claim frame consists of the station's Requested Target Token Rotation Time. In the Ring
Engine implementation, TREQ is programmable with
20.48
resolution and a maximum value of 1.34 seconds.

"'S

Claim Protocol
Entry to the Claim state occurs whenever token recovery is
required. The Recovery Required condition occurs when:
• TRT expires and late_Flag is set
o TVX expires

• A lower Claim frame or My_Beacon frame is received
Entry to the Claim state may be blocked by enabling the
Inhibit Recovery Required option (bit Option.ITR).

Additionally, only the station that sets the A Indicator is permitted to set the C Indicator on such frames. In this way, the
station that sends out the NSA frame can determine if the
next addressed station copied the frame by examining the
returning C Indicator.

The Claim state is entered (even if Option.IRR = 1) with a
SM_MLControl.request (Claim) (Set Function.ClM to 1).
While in the Claim state:
• Claim frames are transmitted continuously

5.7 MAC FRAME PROCESSING

• If a Higher Claim frame is received, the station exits the
Claim state and enters the IDLE state. In this state it then
repeats additional Higher Claim frames.

Upon the reception of a valid MAC frame (Claim, Beacon, or
Other), the Ring_Operational flag is reset and the Ring Engine enters the Idle, Claim or Beacon State. Received Claim
and Beacon frames are processed as defined in the Standard (See Appendix A), unless inhibited by the bits in the
Option Register.

• If a lower Claim frame is received, this station continues
to send its own Claim frames and remains in the Claim
state.
Eventually, if a logical ring exists, the station with the shortest TREQ on the ring should receive its own Claim frames,
the My Claim frame. This completes the Claim Token Pro·
cess. This one station then earns the right to issue a token
to establish an Operational ring.

5.7.1 Claim Token Process
Receive
When a Claim frame is received, its Frame Type is reported
(Claim frame) along with the type of Claim frame.
There are three types of Claim frames:
Higher_Claim, and lower_Claim.

An option is provided to remain in the Claim state if this
station won the Claim Token Process by enabling the Inhibit
Token Release Option (bit Option.ITR).

My_Claim,

A My_Claim frame is a Claim frame with a Source Address
that matches this station address and the T_Bid_Rc in the
INFO field is equal to this station's TREQ.

2-149

?-

CD
C'oI

C")
IX)

Q.

C

r----------------------------------------------------------------------------------------------,
5.0 Functional Description (Continued)
5.7.2 Beacon Process

5.8 RECEIVE BATCHING SUPPORT
The Ring Engine stores each received SA and compares
the incoming SA with the previous SA. This may be used to
batch status on frames received from the same station.
The SameSA signal is asserted when:
1. The curent and previous non-Void frames were not MAC
frames

Receive
When a Beacon frame is received, its Frame Type is reported (Beacon frame) along with the type of Beacon frame.
There are two types of Beacon frames: My_Beacon and
Other_Beacon.
A Beacon frame is considered a My_Beacon if its Source
Address matches this station's address (long or short).
A Beacon frame is marked as Other_Beacon if its Source
Address does not match this station's address.

2. The size of the address of the current frame is the same
as the size of the address of the previous non-Void frame
3. The SA of the current frame is the same as the SA of the
previous non-Void frame.
On MAC frames, the Information fields are compared. This
information may be useful to inhibit copying MAC frames
with identical information. This is particularly useful for copying Claim and Beacon frames when new information is pres·
ent.
The Same INFO signal is asserted when:
1. The current and previous non-Void frames were both
MAC frames (not necessarily the same FC value).
2. The first four bytes of the INFO field of the current frame
is the same as the first four bytes of the INFO field of the
previous non·Void frame.
The size of the addre,ss of MAC frames is not checked.

Transmit
Beacon frames are transmitted continuously while in the
Beacon state.
Beacon frames are generated by the Ring Engine, unless an
Immediate Beacon Request is present at the MAC Request
Interface. Even if an Immediate Beacon Request is present
at the MAC Request Interface, at least one Beacon frame
must be generated by the Ring Engine before Beacon
frames from the Interface are transmitted.
For internally generated Beacon frames, the Ring Engine
uses the TBT in the Information field.
Beacon Protocol
Entry to the Beacon state occurs under two conditions:

5.9 IMMEDIATE FRAME TRANSMISSION
Immediate requests are used when it is desirable to send
frames without first capturing a token. Immediate requests
are typically used as part of management processes for error isolation and recovery. Immediate requests are also use·
ful in full duplex applications. Immediate requests are serviced only when the station's Ring_Operational flag is not
set (CTSR.ROP = 0).

• A failed Claim Process (TRT expires during the Claim
process)
• An SM_M~Control.request (Beacon)
(Set Function.BCN to 1).
Beacon frames are then transmitted until the Beacon process is completed.
If an Other_Beacon frame is received, this station exits the
Beacon state, stops sending its own Beacon frames, and
repeats the incoming Beacon frames.,

To transmit an Immediate request, the request must first be
queued at the M~Request Interface. If the Ring is not
operational (RinQ-Operational flag is not set), the request
will be serviced immediately. If the Ring is operational
(Ring_Operational flag is set), the request will be serviced
when the Ring becomes non·operational. The Ring becomes non-operational as a result of a MAC Reset
(Function.MCRST is set to One) or any of the conditions
causing the Reset or Recovery Actions are performed.

If a My_Beacon frame is received, the station has received
back its own Beacon frame; thus successfully completing
the Beacon process. The station then enters the Claim Process.
5.7.3 Handling Reserved MAC Frames
A Reserved MAC frame is any MAC frame aside from the
Claim and Beacon frame. Tokens are not considered MAC
frames even though Format bit (FC.FF) are the same as for
MAC frames.
When a Reserved MAC frame (Other_MAC) is received, it
is treated as a Higher Claim. If the Transmitter is in the
Claim state when a Reserved MAC frame is received, the
Transmitter returns to the Idle state and then repeats the
next Reserved MAC frame received. If the Transmitter is in
the Beacon state and a Reserved MAC frame is received,
the Transmitter continues to transmit Beacon frames. If the
Transmitter is in the Idle state, the Reserved MAC frame is
repeated.

In addition to servicing an Immediate request from the
Tx-Data State, it is also possible to service Immediate requests from the Claim or Beacon State. When transmitting
from the Claim or Beacon state, in addition to requesting an
Immediate Transmission Service Class, the RQCLM or
RQBCN signals (pins 15 and 16) must be asserted to indio
cate an Immediate Claim or Immediate Beacon request.
These requests will only be serviced when in the Claim or
Beacon state. Entry to the Beacon State can be forced

2-150

5.0 Functional Description

(Continued)
When parity is not used on an Interface, the parity provided
by the BMAC device for its outputs may be ignored. For the
BMAC device's inputs, the result of the parity check is used
only if parity on that Interface is enabled.

by setting bit Function.BCN to One. Entry to the Claim State
can be forced by setting bit Function.ClM to One.
While in the Claim or Beacon state, the Ring Engine will
transmit internally generated Claim or Beacon frames except when an Immediate Claim or Beacon request is present at the MA-Request Interface, signal RQClM or
ROBCN is asserted, and a frame is ready to be transmitted.
At least one internally generated Claim or Beacon frame
must be transmitted before an Immediate Claim or Beacon
request is serviced. It is possible for the internally generated
frame to return before the end of the requested frame has
been transmitted. To allow time for the requested frame(s)
to be transmitted before leaving the Claim or Beacon state,
bit ITR (for Claim) or bit IRR (for Beacon) of the Option
Register should be set to One.

Interface parity is enabled by setting the appropriate bit in
the Mode register: Mode.CBP for Control Bus Parity,
Mode.PIP for PHY Indication parity and Mode.MRP for MAC
Request Parity. A Master Reset (Function. MARST) disables
parity on all interfaces.
On the PHY Request interface, parity is generated for internally sourced fields (such as the SA or FCS on frames when
not using SA or FCS transparency, and internally generated
Beacon, Claim and Void frames). In REV 1 of the BMAC
device, MRP is passed transparently to PRP for externally
sourced fields independent of the value of the Mode.MRP.
In all later revisions, correct Odd parity is always generated
for PRP. This allows through parity support at the PHY interface even if parity is not used at the MAC interface. This is
very desirable since every byte of data that traverses the
ring travels across the PHY Interface which is actually part
of the ring.

While an Immediate request is being serviced (from any
state), if bit IRPT of the Option Register is set to One (Inhibit
Repeat option), all received frames (except lower_Claim
and My_Beacon frames) are ignored and the Immediate
request continues. lower_Claim and My_Beacon frames
can also be ignored by setting bit IRR of the Option Register.

Through parity is not supported in the Control Interface Registers and the Parameter RAM. Parity is generated and
stripped at the Control Interface.

5.10 FUll DUPLEX OPERATION
The BMAC device supports full duplex operation by
1. Suspending the Token Management and Token Recovery protocols (set Option.IRR)

Handling Parity Errors
Parity errors are reported in the Exception Status Register
when parity on that interface is enabled.
A parity error at the PHY interface (when Mode.PIP is set) is
treated as a code violation and ESR.PPE is set. If the parity
error occurs in the middle of a POU (token or frame) reception, the POU is stripped, a Format Error is Signaled
(Fa ERROR) and the lost Count is incremented.

2. Inhibiting the repetition of all PO Us (set Option.IRpn
3. Using the Immediate Service Class
Frames of any size may be transmitted or received, subject
to the minimum length specified in Section 5.4.
5.11 PARITY PROCESSING
The BMAC device contains five data interfaces as shown in
Table 5-6.

A parity error at the MAC Interface (when Mode.MRP is set)
during a frame transmission from the MAC interface (while
TXACK is asserted) causes the frame transmission to be
aborted. When a frame is aborted, a Void frame is transmitted to reset every station's TVX timer. A parity error (when
enabled) causes ESR.MPE to be set.

Through Parity is supported on the internal data paths between any Request interface and any Indicate interface.
Odd Parity is provided every clock on all data outputs and is
checked every clock on all data inputs. Parity errors are not
propagated through the BMAC device (from the MAC Request and PHY Indication interface to the PHY Request interface or from the PHY Indication interface to the MAC
Indication interface). Parity errors are isolated and resolved.

A parity error at the Control Interface (when Mode.CBP is
set) will cancel the current write access. ESR.CPE is set to
indicate that a parity error occurred and ESR.CCE is set to
indicate that the write was not performed.

TABLE 5-6. BMAC Device Parity
Parity
On

Parity

MAC Request Interface

MRD(7:0)

MRP

I

MAC Indication Interface

MID(7:0)

MIP

a

PHY Request Interface

PRD(7:0),
PRC

PRP

a

PHY Indication Interface

PID(7:0),
PIC

PIP

I

Control Interface

CBD(7:0)

CBP

1/0

Interface

2-151

Direction

til

.,...
CD
N
C")

CO

a..
Q

6.0 Control Information
6.2 ACCESS RULES

The Control Information includes Operation, Event, Status
and Parameter Registers that are used to manage and operate the Ring Engine. A processor on the external Control
Bus gains access to read and write these parameters via
the Control Interface.
The Control Information Address Space is divided into 4
groups as shown in Table 6-1. An information summary is
given for each group (see Tables 6-2 through 6-5) followed
by a detailed description of all registers.

All parameters are accessible in Diagnose Mode. Reserved
address space is not accessible in any mode. Certain Status
and Parameter Registers are not accessible while in Run
mode.
All Control Interface accesses are checked against the current operational mode to determine if the register is currentIy accessible. If not currently accessible, the Control Bus
Interface access is rejected (and reported in an Event Register). This means that all Control Bus Interface accesses
complete in a deterministic amount of time.

6.1 CONVENTIONS
When referring to multi-byte fields, by1e 0 is always the most
significant by1e. When referring to bits within a byte, bit (7) is
the most significant bit and bit (0) is the least significant bit.

The Exceptional Status Register can be checked to verify
that the operation terminated normally.

When referring to the contents of a byte, the most signficant
bit is always referred to first.
When referring to a bit within a byte the notation
register_name.biLname is used. For example, Mode.RUN
references the RUN bit in the Mode Register.
TABLE 6-1. Control Information Address Space
Write Conditions

Address Range

Description

Read Conditions

00-07

Operation Registers

Always (Note 2)

Always (Note 2)

08-2F

Event Registers

Always (Note 2)

Always (Cond) (Note 2)

30-3F

Reserved

N/A

N/A

40-7F

MAC Parameters

Stop Mode
(Notes 1,3)

Stop Mode
(Notes 1, 3)

80-BF

Counters/Timers

Always

Stop Mode
(Note 1)

CO-FF

Reserved

N/A

N/A

Note 1: An attempt to access a currently inaccessible location because of the current mode or because it is in a reserved address space will cause a command
error (bit CCE of the Exception Status Register is set to One).
Note 2: Read and write accesses to reserved location within the Operation and Event Address ranges cause a command error (bit CeE of the Exception Status
Register is set to One).
Note 3: The MAC Parameter RAM is also accessible when conditions a, b, and c are true. Otherwise accesses will cause a command error (ESR.GEE set to One)
and the access will not be performed.
a. The MAC Transmitter is in states TO, T1 or T3;
b. Bits ITC and IRR of the Option Register are set to One.
c. Bits ClM and BCN of the Function Register are not set to One.
Note 4: Reserved bits in registers are always read as 0 and are not writable.

TABLE 6-2. Operation Registers
Addr

Name

07

06

05

04

03

02

01

DO

Read

Write

0

Mode

DIAG

IlB

RES

RES

PIP

MRP

CBP

RUN

Always

Always

1

Option

ITC

EMIND

IFCS

IRPT

IRR

ITR

ELA

ESA

Always

Always
Always

2

Function

RES

RES

RES

ClM

BCN

MCRST

RES

MARST

Always

3-6

Reserved

RES

RES

RES

RES

RES

RES

RES

RES

N/A

N/A

7

Revision

Always

Always

REV(7-0)

Note: Attempts to access reserved locations will result in Command Rejects (ESR.CCE set to ONE).

2-152

C

"tI

6.0 Control Information (Continued)

CO
Co)

N

Addr
9-8
C
D
E
F
10

Name
CMP
Reserved
CRSO
Reserved
CTSO
Reserved
RELRO

11

REMRO

12
13
14
15
16-17
18

RElR1
REMR1
TElRO
TEMRO
Reserved
CllR

19

CIMR

8

1A-1B Reserved
1C
COLR
1D

COMR

1E-27

Reserved

28

IElR

29-2B
2C
2D
2E
2F

Reserved
ESR
EMR
ICR
IMR

TABLE 6-3. Event Registers
04
03
02
01
DO
Read
Write
Always Always
CMP(7-0)
N/A
N/A
RES
RES
RES
RES
RES
RES
RES
RES
RFLG
RS1
RSO
RTS2
RTS1
RTSO
Always Ignore
RS2
RES
N/A
N/A
RES
RES
RES
RES
RES
RES
RES
RES
ROP
TS2
TS1
TSO
TTS3
TTS2
TTS1
TTSO
Always Ignore
N/A
N/A
RES
RES
RES
RES
RES
RES
RES
RES
DUP
Always Condition
RES
PINV
OTR
CLMR
8CNR
RNOP
ROP
ADD
MAC
DUP
OTR
RES
PINV
8CNR
ROP
Always Always
CLMR
RNOP
ADD
MAC
LOClM HIClM MYClM
RES
RES
RES
MYBCN OTRBCN Always Condition
LOCLM HICLM MYCLM
RES
RES
RES
MYBCN OTRBCN Always Always
RlVD TKPASS TKCAPT CBERR DUPTKR TRTEXP TVXEXP ENTRMD Always Condition
RlVD TKPASS TKCAPT CBERR DUPTKR TRTEXP TVXEXP ENTRMD Always Always
N/A
N/A
RES
RES
RES
RES
RES
RES
RES
RES
RES
TK
FR
FR
FR
FR
FREI
FR
Always Condition
RCVD
TRX
NCOP
COP
lST
RCV
Always Always
RES
TK
FR
FR
FR
FR
FREI
FR
RCVD
TRX
NCOP
COP
LST
RCV
N/A
N/A
RES
RES
RES
RES
RES
RES
RES
RES
Always Condition
RES
TK
FR
FR
FR
FR
FREI
FR
RCVD
TRX
NCOP
COP
lST
RCV
RES
TK
FR
FR
FR
FR
FREI
FR
Always Always
RCVD
RCV
TRX
NCOP
COP
LST
RES
RES
RES
RES
N/A
N/A
RES
RES
RES
RES
TSM
RSM
RES
RES
RES
RES
MPE
Always Condition
RES
ERR
ERR
N/A
N/A
RES
RES
RES
RES
RES
RES
RES
RES
CWI
CCE
CPE
RES
RES
RES
RES
PPE
Always Condition
ZERO
CCE
CPE
RES
RES
RES
RES
PPE
Always Always
ESE
IERR
RES
RES
COE
CIE
TIE
RNG
Always Ignore
ESE
IER
RES
RES
COE
CIE
TIE
RNG
Always Always
07

06

05

Note 1: Attempts to access reserved locations will result In Command Rejects (ESR.CCE set to ONE).
Note 2: Bits in the conditional write registers are only written when the corresponding bit in the Compare Register is equal to the bit to be overwritten and the bit is
not changing in that cycle.

2-153

....
en

~ r---------------------------------------------------------------~--------------__,

~
C")
co
a.

6.0 Control Information (Continued)
TABLE 6-4. MAC Parameter RAM (Continued)

TABLE 6-4. MAC Parameter RAM

C

Register
Contents

Address

Name

Register
Contents

40

MLAO

MLA(47-40)

60

PGM10

PGM(87-80)

41

MLA1

MLA(39-32)

61

PGMll

PGM(8F-88)

42

MLA2

MLA(31-24)

62

PGM12

PGM(97-90)

43

MLA3

MLA(23-16)

63

PGM13

PGM(9F-98)

44

MLA4

MLA(15-8)

64

PGM14

PGM(A7-AO)
PGM(AF-A8)

Address

Name

45

MLA5

MLA(7-0)

65

PGM15

46

MSAO

MSA(15-8)

66

PGM16

PGM(B7-BO)

47

MSAl

MSA(7-0)

67

PGM17

PGM(BF-B8)

48

GLAO

GLA(47-40)

68

PGM18

PGM(C7-CO)

49

GLAl

GLA(39-32)

69

PGM19

PGM(CF-G8)

4A

GLA2

GLA(31-24)

6A

PGM1A

PGM(D7-DO)

4B

GLA3

GLA(23-16)

6B

PGM1B

PGM(DF-D8)

4C

GLA4

GLA(15-8)

6C

PGM1C

PGM(E7-EO)

4D

Reserved

6D

PGM1D

PGM(EF-E8)

6E

PGM1E

PGM(F7-FO)

6F

PGM1F

PGM(FF-F8)

70

PGMO

PGM(7-0)

4E

GSAO

4F

Reserved

50

TREQO

TREQ(31-24)

GSA(15-8)

51

TREQl

TREQ(23-16)

71

PGMl

PGM(F-8)

52

TREQ2

TREQ(15-8)

72

PGM2

PGM(17-10)

53

TREQ3

TREQ(7-0)

73

PGM3

PGM(lF-18)

54

TBTO

TBT(31-24)

74

PGM4

PGM(27-20)
PGM(2F-28)

55

TBTl

TBT(23-16)

75

PGM5

56

TBT2

TBT(15-8)

76

PGM6

PGM(37-30)

57

TBT3

TBT(7-0)

77

PGM7

PGM(3F-38)

58

FGMO

FGM(7-0)

78

PGM8

PGM(47-40)

59

FGMl

FGM(F-8)

79

PGM9

PGM(4F-48)

5A-5F

RES

Reserved

7A

PGMA

PGM(57-50)

7B

PGMB

PGM(5F-58)

Note: The MAC Parameler RAM is accessible in Stop mode and In RUN
mode while Ihe MAC Transmitter is in Ihe stales TO, T1 or T3; Option.ITC and
Oplion.lRR are sel; and Function.BCN and Funclion.ClM are not set. Other·
wise a command reiect Is given (ESA.CCE) and the Parameter RAM will not
be read or written.

2-154

7C

PGMC

PGM(67-60)

7D

PGMD

PGM(6F-68)

7E

PGME

PGM(77-70)

7F

PGMF

PGM(7F-78)

r-------------------------------------------------------------------------~

6.0 Control Information

0:1

(0)

TABLE 6-5. MAC Counters and Timer Thresholds
(Continued)

TABLE 6-5. MAC Counters and Timer Thresholds
Address

Name

80-86

Reserved

87

THSH1

88-92

Reserved

93

TMAX

Register
Contents

Null(7-4),
THSH1(3-0)

Null(7-4),
TMAX(3-0)

Address

Name

Register
Contents

BO

FNCTO

Zero(31-24)

B1

FNCT1

Null(7-4),
FNCT(19-16)

B2

FNCT2

FNCT(15-8)

B3

FNCT3

FNCT(7-0)

B4

FTCTO

Zero(31-24)

94-96

Reserved

B5

FTCT1

97

TVX

Null(7-4),
TVX(3-0)

Null(7-4),
FTCT(19-16)

B6

FTCT2

FTCT(15-8)

98

TNEGO

TNEG(31-24)

B7

FTCT3

FTCT(7-0)

99

TNEG1

TNEG(23-16)

B8

TKCTO

Zero(31-24)

9A

TNEG2

TNEG(15-8)

B9

TKCT1

9B

TNEG3

TNEG(7-0)

Null(7-4),
TKCT(19-16)

9C-9E

Reserved

TKCT(15-8)

9F

LTCT

Null(7-4),
LTCT(3-0)

AO

FRCTO

Zero(31-24)

A1

FRCT1

Null(7-4),
FRCT(19-16)

A2

FRCT2

C
."

(Continued)

FRCT(15-8)

BA

TKCT2

BB

TKCT3

TKCT(7-0)

BC

RLCTO

Zero(31-24)

BD

RLCT1

Null(7-4),
RLCT(19-16)

BE

RLCT2

RLCT(15-8)

BF

RLCT3

RLCT(7-0)

A3

FRCT3

FRCT(7-0)

Note: The MAC event counters and timer thresholds are always readable,
and are writable in Stop mode.

A4

EICTO

Zero(31-24)

Note: Null(7-4) indicates that these bits are forced to zero on reads, and are
ignored on writes.

A5

EICT1

Null(7-4),
EICT(19-16)

A6

EICT2

EICT(15-8)

A7

EICT3

EICT(7-0)

A8

LFCTO

Zero(31-24)

A9

LFCTO

Null(7-4),
LFCT(19-16)

AA

LFCT1

LFCT(15-8)

AB

LFCT2

LFCT(7-0)

AC

FCCTO

Zero(31-24)

AD

FCCT1

Null(7-4),
FCCT(19-16)

AE

FCCT2

FCCT(15-8)

AF

FCCT3

FCCT(7-0)

Note: The value obtained on reads from reserved locations is not specified.

The Event Counters are 20·bit counters and are read
through three control accesses. In order to guarantee a
consistent snapshot, whenever byte 3 of an event counter is
read, byte 1 and byte 2 of the counters are loaded into a
holding register. Byte 1 and byte 2 may then be read from
the holding register. A single holding register is shared by all
of the counters but (for convenience) is accessible at several places within the address space. Consistent readings
across counters can be accomplished using the Counter
Increment Latch Register (CILR).
The Event Counters are not reset as a result of a Master
Reset. This may be done by either reading the counters out
and keeping track relative to the initial value read, or by
writing a value to all of the counters in stop mode. The
counters may be written in any order. With some exceptions, interrupts are available when the counters increment
or wraparound.
6_3 OPERATION REGISTERS
The Operation Registers are used to control the operation
of the BMAC device. The Operation Registers include the
following registers.
• Mode Register (Mode)
• Option Register (Option)
• Function Register (Function)
• Revision Register (REV)

2-155

N

a>
-'"

6.0 Control Information (Continued)
Mode Register (Mode)
The Mode Register (Mode) contains the current mode of the BMAC device.
ACCESS RULES
Address

I

Read

I

OOh

Write

I

Always

I

Always

REGISTER BITS
07

I

DIAG

Bit

06

I

ILB

05

I

RES

04

I

RES

03

I

PIP

02

I

MRP

01

I

CBP

Symbol

DO

I

RUN

I

Description

DO

RUN

RUN/Stop:
0: Stop Mode
All state machines return to and remain in their zero state. All counters and timers are disabled. The Ring
Engine transmits Idle symbols.
1: Run Mode. Must'be in Run Mode to achieve an operational Ring.

D1

CBP

Control Bus Parity: Enables Odd Parity checking on the Control Bus Data pins (CBD7 -0) during write
accesses.
If a parity error occurs, the CPE bit of the Exception Status Register is set to One and an 'interrupt is
generated. The write data will not be deposited in the register. Parity is always generated on CBD7 -0 during
read accesses

D2

MRP

MAC Request Parity: Enables Odd Parity checking on the MAC Request Data pins (MRD7 -0). A parity
error causes the transmission to be aborted. In REV 1 of the BMAC device MIP is always passed
transparently from PIP. In all later revisions correct Odd parity is always generated on MIP.

D3

PIP

PHY Indicate Parity: Enables Odd Parity checking on the PHY Indicate Data pins (PID7 -0). Parity errors
are treated as code violations and cause the byte in error to be replaced with Idle symbols. In REV 1 of the
BMAC device Parity is passed transparently between, MRP,and PRP during transmission. When repeating,
Parity is passed transparently from PIP to PRP. Odd Parity is generated for all internally generated fields. In
all later revisions correct Odd Parity is always generated on the PHY Request Data pins (PRD7 -0).

D4-5

RES

Reserved

D6

ILB

Internal Loopback: Enables the internalloopback that connects PRP, PRC, and PRD7 -0 to PIP, PIC, and
PID7 -0 respectively. When enabled, the PHY Indicate Interface is ignored.
Since the Ring Engine Transmitter and Receiver work as independent processes, a ring can be made
operational in this mode, albeit consisting only of a single MAC. With an operational ring many diagnostic
tests can be performed to test out MAC level and system level diagnostics including: the Beacon Process,
the Claim Process, Ring Engine frame generation, token timers, event counters, transmission options, test
of event detection capabilities, test of addressing modes, test of state machine sequencing options, etc. In
addition, a large portion of the system interface logic can be tested, such as full duplex transmission to self
within the limits of the system interface performance constraints, status handling and generation, etc.
The same system tests can also be performed at different levels of loopback including through the various
paths within a station: through the PMD interface of the PLAYER device, and through the CRD device.
System level tests can also be performed through the ring during normal operation.

D7

DIAG

Diagnose Mode: Enables access to all BMAC device registers. When set, interoperability is not
guaranteed. This bit should only be set when the BMAC device is not inserted in a ring.
In diagnose mode, should an internal error occur the Current Receive and Transmit Status Registers are
frozen with the errored state until the internal state machine error condition is cleared (lELR.RSMERR
and/or IELR.TSMERR).

2·156

.----------------------------------------------------------------------,0
~

6.0 Control Information (Continued)
Option Register (Option)
The Ring Engine supports several options. These options are typically static during operation but may be altered during
operation. This register is initialized to Zero after a master reset.
ACCESS RULES
Read

Address

I

I

01h

Always

w
~

....

Write

I

Always

I

REGISTER BITS
D7

I

D6

ITC

I

D5

EMIND

D4

I IFCS I IRPT

D3

I

IRR

D2

I

ITR

D1

I ELA

DO

I

ESA

I

Bit

Symbol

DO

ESA

Enable Short Addressing: Enables the setting of A-J'lag on matches of received Short Destination
Addresses with MSA. Enables the setting of M_Flag and stripping on matches of received Short Source
Addresses with MSA.
Permits transmission of frames with Short Addresses. Frames with Short Addresses can be transmitted when
Short Addressing is not enabled if the SA Transparency option is selected.
Void frames are sent with the Short Address if ESA is set to One. If ESA is Zero and ELA is One, Void frames
are sent with the Long Address.
When both the ESA and ELA bits are Zero, the ring is effectively interrupted at this station. The token capture
process and Error Recovery logic are suspended and no frames are repeated. Immediate requests are
serviced if the SA Transparency option is selected.

Description

D1

ELA

Enable Long Addressing: Enables the setting of A-Flag on matches of received Long Destination
Addresses with MLA. Enables the setting of M_Flag and stripping on matches of received Long Source
Address with MLA.
Permits transmission of frames with Long Addresses. Frames with long addresses can be transmitted when
long addressing is not enabled if the SA transparency option is selected.
Claim and Beacon frames are sent with the Long Address if ELA is One. If ELA is Zero and ESA is One, Claim
and Beacon frames are sent with the Short Address.
When both ESA and ELA are Zero, the ring is effectively interrupted at this station. The token capture process
and Error Recovery logic are suspended and no frames are repeated. Immediate requests are serviced if the
SA Transparency option is selected.

D2

ITR

Inhibit Token Release: When bit ITR is set to One, the station will not issue a token after winning the Claim
Process. The station remains in the Claim state while the station's Claim frames are returning to the station
and it has won the Claim Process. At this point the station is in control of the ring as long as no Higher_Claim
or Beacon frames are received.
While in control of the ring, the station may transmit special Claim or Management frames for a variety of
implementation specific purposes. For example, the station might send out a Claim frame with a unique
identifier to make sure that another station with its address and TREQ is not also Claiming.

D3

IRR

Inhibit Recovery Required: When bit IRR is set to One, the Ring Engine does not take the transitions into the
Claim state (T4). This option inhibits all the recovery required transitions as defined in the FDDI MAC Standard.
This bit does not inhibit entry to the Claim state on a Claim Request generated at the MAC Request Interface
via the Function Register.
This option can be used to guarantee that implementation specific Beacon frames will be transmitted from the
Beacon state. It is also useful in systems where Local Address Administration is used, to prohibit stations with
the Null Address (or any address) from Claiming. The option could also be used to enable the use of the Ring
Engine in full duplex applications (in conjunction with the Inhibit Repeat option) to disable the recovery timers.

2·157

•

6.0 Control Information (Continued)
Option Register (Continued)
Bit

Symbol

04

IRPT

Inhibit Repeat: When enabled,
1. the Ring Engine cannot enter the Transmitter Repeat and Issue_Token states. This causes all received
POUs to be stripped and prevents tokens from being issued.
2. Void frames are not transmitted during a service opportunity.
3. Idle to Repeat transition is inhibited and all received tokens and MAC frames except Lower_Claim and
My_Beacon frames are ignor~d (Lower_Claim and My_Beacon frames may be ignored by setting
Option.IRR).
When the ring is operational, enabling this option causes the Reset actions to occur upon the completion of
the Service Opportunity, if any. When the ring is not operational, Immediate Requests are serviced and
continue to completion.
The Inhibit Repeat option can be used to scrub the ring for a period longer than the Ring Latency. The option is
also useful in full duplex applications.

Description

05

IFCS

Implementer FCS: Enables use of the standard CRC as the FCS on Implementer frames (FC.FF = 10). When
enabled, Implementer frames are treated like all other frames. When Implementer frames are received with
bad FCS and Er= R, the E Indicator is transmitted as Sand EICT is incremented.
On Implementer frames, the Standard does not mandate the setting of the E Indicator on the result of the FCS
check. This allows Implementers to use alternate Frame Check Sequences aside from the standard 32-bit
CRC. Implementers may also choose not to use any FCS in applications such as packet voice.
If other stations in the ring are using Implementer frames with a non-standard FCS, if used, this option may
cause an interoperability problem.

06

EMINO

External Matching Indicators: Enables the setting of the transmitted A Indicator (Ax) as an S symbol when
the EA pin is set. Also enables the setting of the transmitted C Indicator (Cx) as an S symbol when the VCOPY
pin is set if the A Indicator is set as a result of an external match. The Copied/Not Copied Frame Counters are
also incremented as a result of external comparisons when this option is enabled.

07

ITC

Inhibit Token Capture: When enabled, the Ring Engine is prohibited from transmitting any (more) frames.
This option prohibits entry to the Transmit Void and Data states from the Idle state, and causes exit from the
Data state aiter the current frame has been transmitted ..
When enabled, it is still possible to perform Immediate transmissions from the transmitter Claim and Beacon
states, but not from the Data state.
This option can be used to temporarily block normal data service. it can also be used in conjunction with the
Inhibit Recovery Required option to permit access via the Control Interface to the MAC Parameter RAM during
MAC operation.

2-158

6.0 Control Information

(Continued)

Function Register (Function)
The Ring Engine performs the MAC Reset, Claim Request, and Beacon Request using the Function Register. The Register is
initialized to Zero after a master reset. A function is performed by setting the appropriate bit to One. When the function is
complete, the bit is cleared by the Ring Engine.
ACCESS RULES
Address

Read

Write

02h

Always

Always

I

I

I

I

REGISTER BITS

I

D7

D6

D5

D4

D3

D2

D1

DO

RES

RES

RES

ClM

BCN

MCRST

RES

MARST

Bit
DO

I

I

I

I

I

I

Symbol
MARST

I

I

Description
Master Reset: Produces the functions of an SM_CONTROl(MAC Reset) as specified by the FDDI MAC
Standard. Sets all internal state machines and registers to known values.
Master Reset causes the MCRST bit to be set. It also clears the Mode, Option, Event and Mask Registers.
The Timers are set to their defaults. The Event Counters are not cleared.
When the Master Reset function is complete, MARST is cleared. At this time, all bits in the Function
Register should be Zero.

D1

RES

D2

MCRST

Reserved
MAC Reset: Forces the Receiver to state RO (Listen) and the Transmitter to state TO (Idle).
TNEG (Registers 98-9B) is not loaded with TMAX (this operation can be performed as part of the MAC
Reset Request actions by writing to TNEG before the MAC Reset is initiated).
MCRST takes precedence over bits D3 (BCN) and D4 (ClM), but does not clear these bits.
A MAC Reset that occurs while a frame is being transmitted will cause the frame to be aborted. Frames
without the Frame Status are not transmitted by the Ring Engine. Whenever the byte with the Ending
Delimiter is transmitted, valid frame status is transmitted as well. If a MAC Reset occurs during the byte
where the Ending Delimiter and E Indicator should be transmitted, it will not be transmitted. If a MAC Reset
occurs on the cycle where the A and C Indicators are transmitted, they will still be transmitted.

D3

BCN

Beacon Request: Produces the functions of an SM_CONTROL.request (Beacon) as required by the FDDI
MAC Standard. The Ring Engine Transmitter is forced to enter the Beacon State. Beacon frames are then
transmitted until the Beacon Process completes. The Beacon Process will not complete if Option.IRR = 1.
Beacon frames are generated by the Ring Engine unless an Immediate Beacon Request is present at the
MAC Request Interface and a frame is ready to be transmitted. Even with an External Immediate Beacon
Request the Ring Engine transmits at least one Beacon frame before the Beacon frames from the MAC
Request Interface are transmitted.
If an external Beacon frame is to be transmitted, the Beacon frame should first be set up, then the request
should be given to the MAC Request Interface and then bit BCN should be set to One.
Writing to this bit also sets bit D2 (MCRST). This bit is cleared on entry to the Beacon state. If both bits D3
(BCN) and D4 (ClM) are set, bit D3 takes precedence.

D4

ClM

Claim Request: Produces the functions equivalent to an SM_CONTROL.request (Claim) and causes entry
to the Claim State. The Ring Engine Transmitter is forced to enter the Claim State unless the Transmitter is
in the Beacon State or bit BCN is set to One. Claim frames are then transmitted until the Claim Process
completes. The Claim Process will not complete if Option.ITR = 1.
A Claim Request is honored immediately from any state except the Beacon state. It is honored in the
Beacon state when a My_Beacon returns. Claim requests are honored even when Option.IRR = 1.
Claim frames are generated by the Ring Engine unless an Immediate Claim Request is available at the MAC
Request Interface. Even with an Immediate Claim Request at the interface, the Ring Engine transmits at
least one Claim frame before the Claim frames from the MAC Request Interface are transmitted.
If an external Claim frames is to be transmitted, the Claim frame should first be set up, then the request
should be given to the MAC Request Interface before the ClM bit is set to One.
The Claim bit is reset upon entry to the Claim or Beacon state.

D5-7

RES

Reserved

2-159

~

~
co
C')

a.
C

r-----------------------------------------------------------------------------------------~

6.0 Control Information (Continued)
Revision Register (Rev)
The Revision Register (Rev) contains the revision number of the BMAC device.
ACCESS RULES
Address

I

Write

Read

I

02h

Always

I

I

Data Ignored

REGISTER BITS
07

I

REV7

Bit
00-7

06

I

REV6

I

05
REV5

04

I

REV4

02

03

I

REV3

I

REV2

01

I

REV1

Symbol
REV

00

I

REVO

I

Oescription
Revision Number: Bits 00-7 contain the version 10 of the BMAC device.
Software should consult this register for any software-specific issues related to the current version.
OOh reserved
01 h Initial Release
02h First Revision
• Programmable Group Address Modification
• Not copied count does not increment on reception of NSA frames with Ar = S
• Detection of Idle on reception of nl
• Generation of ODD Parity at all times
• Reset of Latency Count on initiation of new measurement

2-160

6.0 Control Information

(Continued)

6.4 EVENT REGISTERS
The Event Registers record the occurrence of events or
series of events. Events are recorded and contribute to generating the Interrupt signal. There is a two-level hierarchy in
generating this signal.
'
,

that have not changed since the last read can be written to
a new value.
Whenever a Condition Latch' Register is read, its contents
are stored in the Compare Register. Each bit of the Compare Register is compared with the current contents of the
Register that is to be written. Writing a bit with a new value
to a Condition Register is only possible when the corresponding bit in the Compare Register matches the bit in the
Condition Register. For any bit that has not changed, the
new value of the bit is written into the Register. For any bit
that has changed, the writing of the bit is inhibited. The fact
that an attempt was made to change a modified bit in the
Register is latched in the Condition Write Inhibit bit in the
Exception Status Register (ESR.CWI).

At the first level of the hierarchy. events are recorded as bits
in the Latch Registers (e.g., Ring Event Latch Registers,
Counter Increment Latch Register). Each Latch Register
has a corresponding Mask Register (e.g., Ring Event Mask
Registers, Counter Increment Mask Register). When a bit in
the Latch Register is set to One and its corresponding bit in
the Mask Register is also set to One, a bit in the Interrupt
Condition Register is set to One.
At the second level of the hierarchy, if a bit in the Interrupt
Condition Register is set to One and the corresponding bit
in the Interrupt Mask Register is set to One, the Interrupt
signal is asserted.
Bits in Conditional Write Registers (e.g., Ring Event Latch
Registers) are only written when the corresponding bits in
the Compare Register are equal to bits to be overwritten.

In the BMAC device, the Compare Register is shared by all
of the Condition Latch Registers and always reflects the
most recent read of one of these registers. (In the
DP83251/5 PLAYER Device, there is a Compare Register
for every Event Register.) For the cases where more than
one register must be read before writing a new value, the
software may write the Compare Register with the most recently read value before writing the register again. Alternatively, the register may be read again before being written.
The Event Registers include the following registers as:

Servicing Interrupts
In the process of servicing an interrupt, a Management Entity may use one or both levels of condition masks to disable
new interrupts while one is being serviced. Soon after the
Management Entity has processed the interrupt to some extent, it is ready to rearm the interrupt in order to be notified
of the next condition.

• Compare Register (CMP)
• Current Receiver Status Register (CRSO)
• Current Transmitter Status Register (CTSO)
• Ring Event Latch Registers (RELRO-1)

The Interrupt Control Register always contains the merged
output of the masked Condition Registers as shown in Figure 6-1. It is only possible to remove a condition by setting
the corresponding Condition Latch Register bit to Zero. By
storing the events on-chip, and having the ability to selectively set bits to Zero, the need for the software to maintain
a copy of the Event Registers is alleviated.

• Ring Event Mask Registers (REMRO-1)
• Token and Timer Event Latch Register (TELRO)
• Token and Timer Event Mask Register (TEMRO)
• Counter Increment Latch Register (CILR)
• Counter Increment Mask Register (CIMR)
• Counter Overflow Latch Register (COLR)

To prevent the overwriting and consequent missing of
events, an interlock mechanism is used. In the period between the Read of a Condition Latch Register, and the corresponding Write to reset the condition, additional events
can occur.

• Counter Overflow Mask Register (COMR)
• Internal Event Latch Register (IELR)
• Exception Status Register (ESR)
• Exception Mask Register (EMR)

In order to prevent software from overwriting bits which
have changed since the last read and losing interrupt
events a conditional write mechanism is employed. Only bits

• Interrupt Condition Register (lCR)
• Interrupt Mask Register (lMR)

II
TLlF/103B7-7

FIGURE 6-1. Event Registers Hierarchy

2-161

,..
CD
N
M
CO

a.
C

r-------------~--------------------------------------------------------------------__,

6.0 Control Information (Continued)
Compare Register (CMP)

The Compare Register (CMP) is written with the contents of a coriditional event latch registers when it is read. The Compare
Register may also be written to directly. During a write to any of the conditional write registers, the contents of the Compare
Register (CMP) is compared with bits 00-7 of the accessed register. Orily bits for which the comparison matches can be written
to a new value.
ACCESS RULES
Address

Read

Write

OSh

Always

Always

REGISTER BITS

07

06

05

04

03

02

01

DO

CMP7

CMP6

CMP5

CMP4

CMP3

CMP2

CMP1

CMPO

2·162

6.0 Control Information (Continued)
Current Receiver Status Register (CRSO)
The Current Receiver Status Register (CRSO) records the status of the Receiver state machine. It is continuously updated. ·It
remains stable when accessed.
When in Diagnose Mode, this register is frozen on an internal error until the internal error event is cleared by resetting the
RSMERR bit in the Internal Event Latch Register.
ACCESS RULES
Address

I

Write

Read

I

OCh

I

Always

Data Ignored

I

REGISTER BITS
07

I

RFLG

06

I

RS2

05

I

RS1

Bit

Symbol

DO-2

RTS(0-2)

04

I

RSO

D3

I

RES

D2

I

RTS2

01

I

RTS1

DO

I

RTSO

I

Description
Receive Timing State: RTS(0-2) represent the current state of the Receiver Timing state
machine. The encoding is shown below.
RTS2

0
0

0
0
1
1
1

RTS1
0
0
1
1
0
0
1

RTSO
1
1
0
1
0
1
x

Receive Timing State
AwaiLSD
ChecLFC
Check-SA
Check-DA
Check-INFO
ChecLMAC
Reserved

D3

RES

Reserved

D4-6

RS(0-2)

Receive State: RS(0-2) represent the current state of the Receive state machine that
implements the ANSI standard MAC Receive Functions. The encoding is shown below.
RS2
RS1
RSO
Receive State
0
0
0
Listen
0
0
1
AwaiLSD
RC_FR_CTRL (Receive FC)
0
1
0
RC_FR_BODY (Rec FR Body)
1
0
1
RC_FFL-STATUS (A & C Ind)
0
0
1
1
0
1
CHECK-TOKEN (Check Token)
RC_FR_STATUS (Optionallnd)
1
1
0
1
1
1
Reserved

D7

RFLG

R_Flag: Current value of the Restricted Flag. When not holding the token indicates the type of
the last valid token received. When holding the token indicates the type of token that will be
issued at the end of the current service opportunity.
0: Non-restricted
1: Restricted

I

2-163

~

~

C")

CD

~

r-------------------------------------------------------------------------------------,
6.0 Control Information (Continued)
Current Transmitter Status Register (CTSO)
The Current Transmitter Status Register (CTSO) records the status of the Transmitter state machine. It is continuously updated.
It remains stable when accessed. When in Diagnose Mode, this register is frozen on an internal error until the internal error
event is cleared by resetting the TSMERR bit of the Internal Event Latch Register. "
ACCESS RULES
Address

I

Read

I

OEh

Write

I

Always

I

Data Ignored

REGISTER BITS
D7

I

ROP

D6

I

TS2

D5

I

TSI

Bit

Symbol

DO-3

TTS(O-3)

D4

I

TSO

D3

I

D2

TTS3

I

Dl

"TTS2

I

TTSI

TTSO

I

TRANSMIT TIMING STATE: TTS(O-3) represent the current state of the Transmitter
Timing state machine. The encoding is shown below.
TTS2

o
o

TTSI

TTSO

0
0
0
0
0 0 1
0 0 1
o
1
0
o
1
0

0
1
0
1
0
1

1

1

0

1
0

1
0

1
0

o
o
1

9h-Fh
TS(O-2)

I

Description

TTS3

D4-6

DO

Transmit Timing State
Idle
Transmit Preamble
Wait for Data (FIFO)
Transmit SD & FC Fields
TransmitDA
Transmit SA
Transmit INFO
Transmit FCS
Transmit ED & FS
Reserved

Transmit State: TS(O-2) represent the current state of the Transmit state machine that
implements the ANSI standard MAC Transmit Functions. The encoding is shown below.
TS2
TSI
TSO
Transmit State'
o
0
0
Idle
0
1
Repeat
o
1
0
Data
o
1
1
Issue Token
1
0
0
Claim
1
0
1
Beacon
1
1
0
Reserved
1
1
1
Void

o

D7

ROP

Ring Operational Flag: Indicates the current value of the local Ring Operational Flag.

2-164

6.0 Control Information (Continued)
Ring Event Latch Register (RELRO)
The Ring Event Latch Register 0 (RELRO) captures conditions that occur on the Ring including the receipt of Beacon and Claim
frames, transitions in the Ring Operational flag, and the receipt of duplicate addresses. Each bit may be masked via the Ring
Event Mask Register 0 (REMRO).
ACCESS RULES
Address

I

Read

I

10h

Always

Write

I

Condition

I

D3

D2

REGISTER BITS
D7

D6

D5

D4

D1

DO

I RES I OUPAOO I PINV I OTRMAC I CLMR I BCNR I RNOP I ROP I
Bit

Symbol

Description

DO

ROP

Ring Operational Set: Is set when the Local Ring Operational flag transitions from 0 to 1.

01

RNOP

Ring Non·Operatlonal Set: Is set when the Local Ring Operational flag transitions from 1 to O.

02

BCNR

Beacon Frame Received: Indicates that a valid Beacon frame was received. When set, restricted and
synchronous requests are not serviced. The type of Beacon frame received is given in Register RELR 1.

03

CLMR

Claim Frame Received: Indicates that a valid Claim frame was received. When set, restricted requests are
not serviced. The type of Claim frame received is given in Register RELR1.

04

OTRMAC

Other MAC Frame Received: Indicates that a MAC frame other than a Beacon or Claim frame was received.
When set, restricted requests are not serviced.

05

PINV

PHY_Invalid Received: Indicates that a PHY_Invalid was received. This could be the result of a PLAYER
device Reset operation.
PHY_Invalid causes the MAC Receiver to enter state RO (Listen).

06

DUPAOO

Duplicate Address Received: Indicates that a valid individual frame addressed to this station was received
with the A indicator set. This could be caused by either a MAC using the same address (duplicate address) or
a strip error at the Source (the frame was received twice).

D7

RES

Reserved

2·165

.,...
co

N

C')

co
Il..
C

6.0 Control Information (Continued)
Ring Event Mask Register 0 (REMRO)
The Ring Event Mask Register 0 (REMRO) is used to mask bits in Register RELRO. If a bit in Register REMRO is set to One, the
corresponding bit in Register RELRO will be applied to the Interrupt Condition Register, which can then be used to generate an
interrupt.
ACCESS RULES
Address

I

I

11h

Write

Read

I

Always

Always

I

REGISTER BITS
07

06

05

04

03

02

01

DO

I RES I OUPAOO I PINV I OTRMAC I CLMR I BCNR I RNOP I Rap I
Bit

Symbol

Description

00

Rap

Ring Operational Mask: This bit is used to mask RELRO.ROP.

01

RNOP

Ring Non-Operational Mask: This bit is used to mask RELRO.RNOP.

02

BCNR

Beacon Frame Mask: This bit is used to mask RELRO.BCNR.

03

CLMR

Claim Frame Mask: This bit is used to mask RELRO.CLMR.

04

OTRMAC

Other MAC Frame Mask: This bit is used to mask RELRO.OTRMAC.

05

PINV

PHY_lnvalid Mask: This bit is used to mask RELRO.PINV.

06

OUPAOO

Duplicate Address Mask: This bit is used to mask RELRO.DUPAOO.

07

RES

Reserved

2-166

6.0 Control Information

(Continued)

Ring Event Latch Register 1 (RELR1)
The Ring Event Latch Register 1 (RELR1) captures the progress of the Beacon and,Claim Processes. During the Beacon
Process, it records reception of an Other_Beacon or a My:.....Beacon. It also identifies Claim frames as Higher, Lower, or My
Claim. Each bit may be masked via the Ring Event Mask Register 1 (REMR1).
ACCESS RULES
Read

Address

I

I

12h

Always

Write

I

Condition

I

REGISTER BITS
D7

D6

D5

D4

D3

D2

D1

DO

I LOCLM I HICLM I MYCLM I RES I RES I RES I MYBCN I OTRBCN I
Bit
DO

Description

Symbol
OTRBCN

Other_Beacon Received: Indicates that an Other_Beacon frame was received.

D1

MYBCN

My_Beacon Received: Indicates that a My_Beacon frame was received.

D2-4

RES

Reserved

D5

MYCLM

My_Claim Received: Indicates that a My_Claim frame was received. (This includes the comparison
between the T_Bid_Rec and TREQ as specified in the standard).

D6

HICLM

Higher_Claim Received: Indicates that a Higher_Claim frame was received.

D7

LOCLM

Lower_Claim Received: Indicates that a Lower_Claim frame was received.

2-167

....

I
Q

6.0 Control Information (Continued)
Ring Event Mask Register 1 (REMR1)
The Ring Event Mask Register 1 (REMR1) is used to mask bits in Register RELR1.lf a bit in Register REMR1 is set to One,the
corresponding bit In Register RELR1 will be applied to the Interrupt Condition Register, which can then be used to generate an
Interrupt to the CPU.
All bits in this register are set to Zero upon reset.
ACCESS RULES
Addre88

I

Read

I

13h

Write

I

Always

Always

I

REGISTER BITS

I

D7
LOCLM

Bit
00

I

D6
HICLM

I

D5
MYCLM

I

D4
RES

I

D3
RES

I

D2
RES

I

D1
MYBCN

Symbol
OTRBCN

I

DO
OTRBCN

I

Description
Other_Beacon Mask: This bit is used to mask RELR1.0TRBCN.

01

MYBCN

My_Beacon Mask: This bit is used to mask RELR1.MYBCN.

02-4

RES

Reserved

05

MYCLM

My_Claim Mask: This bit is used to mask RELR1.MYCLM.

06

HICLM

Higher_Claim Mask: This bit is used to mask RELR1.HICLM.

07

LOCLM

Lower_Claim Mask: This bit is used to mask RELR1.LOCLM.

2-168

6.0 Control Information (Continued)
Token and Timer Event Latch Register 0 (TELRO)
The Token and Timer Event Latch Register 0 (TELRO) informs software of expirations of the Token Rotation Timer (TRT) and
Valid Transmission Timer (TVX). The TELRO Register also reports token events such as duplicate token detection, restricted
token reception, and general token capture and release. The completion of the Ring Latency measurement Is also indicated in
the TELRO Register. Each bit may be masked via the Token and Timer Event Mask Register (TEMRO).
ACCESS RULES
Address

I

14h

I

Read

Write

Always

Condition

I

I

REGISTER BITS
D7

D6

D5

D4

D3

D2

D1

DO

IRLVDITKPAsslTKCAPTICBERRIDUPTKRITRTEXplTVXEXplENTRMDI
Bit

Symbol

DO

ENTRMD

Enter Restricted Mode: Indicates that a Restricted Token was received and that the R_Flag transitioned
from 0 to 1.

Description

D1

TVXEXP

TVX Expired: Indicates that a valid frame or token was not received in TVX time.

D2

TRTEXP

TRT Expired: Indicates that a valid token was not received within 2·TNEG.

D3

DUPTKR

Duplicate Token Received: Indicates that a valid token was received while the transmitter was in state T2
orT3.

D4

CBERR

Claim and/or Beacon Error: Indicates that the Claim and/or Beacon Process failed because TRT expired
while the Transmitter was in state.T4 or T5.

D5

TKCAPT

Token Captured: Indicates that a token has been captured.

D6

TKPASS

Token Passed: Indicates that a valid token has been passed (without capturing it) or has been issued after a
service opportunity.

D7

RLVD

Ring Latency Valid:
0: This bit is set to Zero to request a new latency value from the Ring Engine. In Rev 01 and all future
Revisions, the Ring Latency count is set to zero before each measurement.
1: This bit is set to One when the Ring Latency measurement is complete.
This bit is written unconditionally and is not protected by the Compare Register.

•
2-169

...
~

CD

a.
Q

6.0 Control Information (Continued)
Token and Timer Event Mask Register 0 (TEMRO)
The Token and Timer Event Mask Register 0 (TEMRO) is used to mask bits in Register TELRO. If a bit in Register TEMRO is set
to One, the corresponding bit in Register TELR will be applied to the. Interrupt Condition Register, which can then be used to
generate an interrupt.
All bits in this register are set to Zero upon reset.
ACCESS RULES
Address

I

15h

I

Read

Write

Always

Always

I

I

REGISTER BITS
D7

D6

D5

D4

D3

D2

D1

DO

IRLVolTKPASSITKCAPTICBERRIOUPTOKITRTEXplTVXEXplENTRMOI
Bit

Symbol

00

ENTRMO

Enter Restricted Mode Mask: This bit is used to mask TELRO.ENTRMD.

Description

01

TVXEXP

TVX Expired Mask: This bit is used to mask TELRO.TVXEXP.

02

TRTEXP

TRT Expired and Set Lat8.-Flag Mask: This bit is used to mask TELRO.TRTEXP.

03

OUPTOK

Duplicated Token Received Mask: This bit is used to mask TELRO.OUPTOK.

04

CBERR

Claim/Beacon Error Mask: This bit is used to mask TELRO.CBERR.

05

TKCAPT

Token Captured Mask: This bit is used to mask TELRO.TKCAPT.

06

TKPASS

Token Passed Mask: This bit is used to mask TELRO.TKPASS.

07

RLVO

Ring Latency Valid Mask: This bit is used to mask TELRO.RLVO.

2·170

6.0 Control Information (Continued)
counter Increment Latch Register (CllR)
The Counter Increment latch Register (CllR) records the occurrence of any increment to the Event Counters. Each bit
corresponds to a counter and is set when the corresponding counter is incremented. Each bit may be masked via the Counter
Increment Mask Register (CIMR).
ACCESS RULES
Address

I

Read

I

1Bh

Write

I

Always

Condition

I

REGISTER BITS

07

06

05

04

03

02

01

DO

I RES I TKRCVO I FRTRX I FRNCOP I FRCOP I FRlST I FREI I FRRCV I
Bit

Symbol

DO

FRRCV

Frame Received: Is set when the Frame Received Counter (FRCT) is incremented, indicating the reception
ofa frame.

D!

FREI

Frame Error Isolated: Is set when the Error Isolated Counter (EICT) is incremented, indicating an error has
been insolated.

02

FRlST

Frame lost Isolated: Is set when the lost Frame Counter (lFCT) is incremented, indicating a format error
has been detected in the frame.

03

FRCOP

Frame Copied: Is set when the Frame Copied Counter (FCCT) is incremented, indicating a frame has been
copied.

04

FRNCOP

Frame Not Copied: Is set when the Frame Not Copied Counter (FNCT) is incremented, indicating a frame
could not be copied.

05

FRTRX

Frame Transmitted: Is set when the Frame Transmitted Counter (FTCT) is incremented, indicating a frame
has been transmitted.

06

TKRCVO

Token Received: Is set when the Token Received Counter (TKCT) is incremented, indicating that a token
has been received.

07

RES

Reserved

Description

I

II

2-171

...

CD
N

C')

CD

a.
Q

6.0 Control Information (Continued)
Counter Increment Mask Register (CIMR)
The Counter Increment Mask Register (CIMR) is used to mask bits from the Counter Increment Latch Register (CILR). If a bit in
Register CIMR is set to One, the corresponding bit in Register CILR will be applied to the Interrupt Condition Register, which can
then be used to generate an interrupt.
All bits in this register are set to Zero upon reset.
ACCESS RULES
Address

I

19h

Read

I

Write

I

Always

I

Always

REGISTER BITS
D7

D6

RES

TKRCVO

I I

I

D5
FRTRX

I

D4
FRNCOP

I

D3
FRCOP

I

D2
FRLST

I

D1
FREI

I

DO
FRRCV

I

Bit

Symbol

00

FRRCV

Frame Received Counter Increment Mask: This bit is used to mask CILR.FRRCV.

Description

Error Isolated Counter Increment Mask: This bit is used to mask CILR.FREI.

01

FREI

02

FRLST

Lost Frame Counter Increment Mask: This bit is used to mask CILR.FRLST.

03

FRCOP

Frame Copied Counter Increment Mask: This bit is used to mask CILR.FRCOP.

04

FRNCOP

Frame Not Copied Counter Increment Mask: This bit is used to mask CILR.FRNCOP.

05

FRTRX

Frame Transmitted Counter Increment Mask: This bit is used to mask CILR.FRTRX.

06

TKRCVO

Token Received Counter Increment Mask: This bit is used to mask CILR.TKRCVO.

07

RES

Reserved

2·172

6.0 Control Information (Continued)
Counter Overflow Latch Register (COLR)
The Counter Overflow Latch Register (COLR) records carry events from the 20th bit of the Event Counters. Each bit in the
COLR corresponds to an individual counter. Each bit may be masked via the Counter Overflow Mask Register (COMR).
ACCESS RULES
Address

I

Read

I

lCh

Write

I

Always

Condition

I

REGISTER BITS
06

07

05

04

03

02

01

DO

I RES I TKRCVO I FRTRX I FRNCOP I FRCOP I FRLST I FREI I FRRCV I
Bit

Symbol

DO

FRRCV

Frame Received: Is set to One when the Frame Received Counter (FRCT) overflows.

Description

01

FREI

Frame Error Isolated: Is set to One when the Error Isolated Counter (EICT) overflows.

02

FRLST

Frame Lost Isolated: Is set to One when the Lost Frame Counter (LFCT) overflows.

03

FRCOP

Frame Copied: Is set to One when the Frame Copied Counter (FCCT) overflows.

04

FRNCOP

Frame Not Copied: Is set to One when the Frame Not Copied Counter (FNCT) overflows.

05

FRTRX

Frame Transmitted: Is set to One when the Frame Transmitted Counter (FTCT) overflows.

06

TKRCVO

Token Received: Is set to One when the Token Received Counter (TKCT) overflows.

07

RES

Reserved

•
2-173

6.0 Control Information (Continued)
Counter Overflow Mask Register (COMR)
The Counter Overflow Mask Register (COMR) is used to mask bits Irom the Counter Overflow Latch Register (COLR). II a bit in
Register COMR is set to One, the corresponding bit in Register COLR will be applied to the Interrupt Condition Register, which
can then be used to generate an interrupt.
All bits in this register are set to Zero upon reset.
ACCESS RULES
Read

Address

I

10h

I

Write

I

Always

Always

I

REGISTER BITS
07

06

05

04

03

02

01

00

I RES I TKRCVO I FRTRX I FRNCOP I FRCOP I FRLST I FREI I FRRCV I
Bit

Symbol

00

FRRCV

Frame Received Counter Overflow Mask: niis bit is used to mask COLR.FRRCV.

01

FREI

Error Isolated Counter Overflow Mask: This bit is used to mask COLR.FREI.

02

FRLST

Lost Frame Counter Overflow Mask: This bit is used to mask COLR.FRLST.

03

FRCOP

Frame Copied Counter Overflow Mask: This bit is used to mask COLR.FRCOP.

04

FRNCOP

Frame Not Copied Counter Overflow Mask: This bit is used to mask COLR.FRNCOP.

05

FRTRX

Frame Transmitted Counter Overflow Mask: This bit is used to mask COLR.FRTRX.

06

TKRCVO

Token Received Counter Overflow Mask: This bit is used to mask COLR.TKRCVO.

07

RES

Reserved

Oescription

2-174

6.0 Control Information

(Continued)

Internal Event Latch Register (IELR)
The Internal Event Latch Register (IELR) reports internal errors in the BMAC device. These errors include MAC Parity errors and
inconsistencies in the Receiver and Transmitter state machines.
After an internal state machine is detected and reported (bit RSMERR for the receiver and TSMERR for the transmitter), the
Current Receive Status Register (CRSO) and Current Transmit Status Register (CTSO) continue to be updated as normal.
Errors internal to the BMAC device cause a MAC_Reset.
ACCESS RULES
Address

I

Read

I

28h

Write

I

Always

Condition

I

REGISTER BITS
07

I

RES

Bit
DO

06

I

RES

05

I

RES

04

I

RES

03

I

TSMERR

02

I

01

RSMERR

I

Symbol
MPE

DO

RES

I

MPE

I

Description
MAC Interface Parity Error: Indicates a Parity Error on the MAC Request Data pins (MR07-0) when
parity is enabled on the MA-Request interface (bits MRP of the Mode Register is set and pin TXACK is
asserted).

01

RES

Reserved

02

RSMERR

Receive State Machine Error: Indicates inconsistency in the Receiver state machine. When set, causes
bit MCRST of the Function Register to be set.

03

TSMERR

Transmit State Machine Error: Indicates inconsistency in the Transmitter state machine. When set,
causes bit MCRST of the Function Register to be set.

04-7

RES

Reserved

2-175

.-

I
c

6.0 Control Information (Continued)
Exception Status Register (ESR)
The Exception Status Register (ESR) reports errors to the software. Errors include PHY Interface Parity errors, illegal attempts
to access currently inaccessible registers, and writing to a conditional write location if a register bit has changed since it was last
read. Each bit may be masked via the Exception Mask Register (EMR).
ACCESS RULES
Address

I

Write

Read

I

2Ch

I

Always

I

Condition

REGISTER BITS
D7

I

CWI

Bit

DO

D6

I

CCE

D5

I

CPE

D4

I

RES

D3

I

RES

D2

I

RES

D1

I

RES

Symbol
PPE

DO

I

PPE

I

Description
PHY Interface Parity Error: Indicates parity error detected on PID7 -0. Parity errors are reported when
parity is enabled on the PHY_Request Interface (bit PIP of the Mode Register is set).

01-4

RES

Reserved

05

CPE

Control Bus Parity Error: Indicates a Control Bus Parity Error was detected on the Control Bus Data pins
(CBD7 -0) during a write operation to a register. Parity errors are reported if parity is enabled on the Control
Bus Interface (bit CBP of the Mode Register is set).

06

CCE

Control Bus Command Error: Indicates that a Control Bus command was not performed due to an error,
i.e., illegal command or a Control Bus Write Parity error. An illegal command is an attempt to access a
currently inaccessible register.

07

CWI

Conditional Write Inhibit: Indicates that at least one bit of the previous conditional write operation was not
written. This bit is set unconditionally after each write to a conditional write register if the value of the
Compare Register is not equal to the value of the register that was accessed for a write before it was
written. This may Indicate that the accessed register has changed since it was last read.
This bit is cleared after a successful conditional write. This occurs when the value of the Compare Register
is equal to the value of the register that was accessed for a write before it was written.
CWI does not contribute to setting the ESE bit of the Interrupt Condition Register (it is always implicitly
masked).

2-176

C

.."

6.0 Control Information (Continued)

OCI
Co)

N

The Exception Mask Register (EMR) is used to mask bits in the Exception Status Register (ESR). If a bit in Register EMR is set
to One, the corresponding bit in Register ESR will be applied to the Condition Register, which can then be used to generate an
interrupt.
All bits in this register are set to Zero upon request.
ACCESS RULES
Address

I

Read

I

20h

Write

I

Always

Always

I

REGISTER BITS
07

I

ZERO

Bit
00

06

I

CCE

05

I

CPE

04

I

RES

03

I

RES

02

I

RES

01

I

00

RES

Symbol
PPE

....

en

Exception Mask Register (EMR)

I

PPE

I

Oescription
PHY Interface Parity Error Mask: This bit is used to mask ESR.PPE.

01-4

RES

Reserved

05

CPE

Control Bus Parity Error Mask: This bit is used to mask ESR.CPE.

06

CCE

Control Bus Error Mask: This bit is used to mask ESR.CCE.

07

ZERO

Zero: This bit is always Zero. This implies that the CWI bit never contributes to the Interrupt Signal.

2-177

6.0 Control Information (Continued)
Interrupt Condition Register (ICR)
The Interrupt Condition Register (ICR) collects unmasked interrupts from the Event Registers. Interrupts are categorized into
Ring Events, Token and Timer Events, Counter Events, and Error and Exceptional Status Events. If the bit in the Interrupt Mask
Register (IMR) and the corresponding bit in the ICR are set to One, the INT pin is forced low and thus triggers an interrupt.
Note: Bits are cleared ONLY by cleartng underlying conditions (Mask bit andlor Event Bit) In the approprtate Event Register.

ACCESS RULES
Address

I

Read

I

2Eh

Write

I

Always

Data Ignored

I

REGISTER BITS
07

I

ESE

Bit

06

I

IERR

05

I

RES

04

I

RES

03

I

CaE

02

I

CIE

01

I

TIE

Symbol

DO

I

RNG

I

Description

DO

RNG

Ring Event Interrupt: Is set if corresponding bits in the Ring Event Latch and Mask Registers are set.

D1

TIE

Token and Timer Event Interrupt: Is set if corresponding bits in the Token and Timer Event Latch and
Mask Registers are set.

D2

CIE

Counter Increment Event Interrupt: Is set if corresponding bits in the Counter Increment Latch and Mask
Registers are set.

D3

CaE

Counter OverflOW Event Interrupt: Is set if corresponding bits in the Counter Overflow Latch and Mask
Registers are set.

D4-5

RES

Reserved

D6

IERR

Internal Error Interrupt: Is set if any bits in the Internal Event Register are set.

D7

ESE

Exception Status Event Interrupt: Is set if corresponding bits in the Exception Status and Mask Registers
are set.

2-178

C
"tI
co

6.0 Control Information (Continued)

c.:I
N

Interrupt Mask Register (IMR)

0)

The Interrupt Mask Register (IMR) is used to mask bits in the Interrupt Condition Register (lCR). If a bit in Register IMR and the
corresponding bit in Register ICR are set to One, the INT pin is forced low and causes an interrupt. Each bit in the IMR
corresponds to an Event Register or a pair of Event Registers and associated bits.
ACCESS RULES
Address

I

Write

Read

I

2Fh

I

Always

I

Always

REGISTER BITS
D7

I

ESE

Bit

D6

I

IERR

D5

I

RES

D3

D4

I

RES

I

CaE

D2

I

CIE

D1

I

TIE

Symbol

DO

I

RNG

I

Description

DO

RNG

Ring Event Mask: This bit is used to mask ICR.RNG.

D1

TIE

Token and Timer Event Mask: This bit is used to mask ICR.TIE.

D2

CIE

Counter Increment Event Mask: This bit is used to mask ICR.CIE.

D3

CaE

Counter Overflow Event Mask: This bit is used to mask ICR.COE.

D4-5

RES

Reserved

D6

IERR

Internal Error Mask: This bit is used to mask ICR.IER.

D7

ESE

Exception Status Event Mask: This bit is used to mask ICR.ESE.

2-179

......

6.0 Control Information (Continued)
6.S MAC PARAMETERS
The MAC Parameters are accessible in the Stop Mode. These parameters are also accessible in the Run Mode when the
following conditions are met:
a) the MAC Transmitter is in state TO, T1, or T3; and
b) bits ITC and IRR of the Option Register are set to One; and
c) bits CLM and BCN of the Function Register are set to Zero.
Otherwise read and write accesses will cause a command error (bit CCE of the Exception Status Register is set to One) and the
access will not be performed.
The MAC Parameters are stored in the MAC Parameter RAM. They include the following control information:
• Individual Addresses: My Long Address (MLAO-5) and My Short Address (MSAO-1).
• Group Addresses: Group Long Address (GLAO-4) and Group Short Address (GSAO), Programmable Group Map
(PGMO-1F), and Fixed Group Map (FGMO-1) .
• MAC Frame Information: Requested Target Token Rotation Time (TREQO-3) and Transmit Beacon Type (TBTO-3).
6.S.1 Individual Addresses
The Ring Engine supports both Long and Short Individual Addresses simultaneously. The Station's Long Address is stored in
registers MLAO-5. The Station's Short Address is stored in register MSAO-1.
For received frames, MLA or MSA is compared with the received DA in order to set the Address recognized Flag (A Flag) and
compared with the received SA in order to set the My Address recognized Flag (M Flag). In transmitted frames, MLA or MSA
normally replaces the SA from the frame data stream (exception: when SA transparency is used).
Bits MLA(47) and MSA(15) are the most significant bits of the address and are transmitted and received first. Bits MLA(O) and
MSA(O) are the least significant bits of the address and are transmitted and received last.
MLA and MSA should be valid for at least 12 byte times before the Addressing Mode is enabled and should remain valid for at
least 12 byte times after the Addressing Mode is disabled in order to guarantee proper detection.
Bits ELA (Enable Long Addressing) and ESA (Enable Short Addressing) in the Option Register determine the address types that
may be recognized and generated by this MAC.
My Long Address
My Long Address (MLAO-MLA5) represent this station's long 48-bit address.
ACCESS RULES
Address

Read

Write

40-45h

Stop Mode

Stop Mode

07

D6

os

04

D3

02

01

DO

MLAO

MLA(47)

MLA(46)

MLA(45)

MLA(44)

MLA(43)

MLA(42)

MLA(41)

MLA(40)

MLA1

MLA(39)

MLA(38)

MLA(37)

MLA(36)

MLA(35)

MLA(34)

MLA(33)

MLA(32)

MLA2

MLA(31)

MLA(30)

MLA(29)

MLA(28)

MLA(27)

MLA(26)

MLA(25)

MLA(24)

MLA3

MLA(23)

MLA(22)

MLA(21)

MLA(20)

MLA(19)

MLA(18)

MLA(17)

MLA(16)

MLA4

MLA(15)

MLA(14)

MLA(13)

MLA(12)

MLA(11)

MLA(10)

MLA(9)

MLA(8)

MLAS

MLA(7)

MLA(6)

MLA(5)

MLA(4)

MLA(3)

MLA(2)

MLA(1)

MLA(O)

Note: MLA(47) should always be set to O.

My Short Address
My Short Address (MSAO-MSA1) represent this station's short 16-bit address.
ACCESS RULES
Address

Read

Write

46-47h

Stop Mode

Stop Mode

MSAO

MSA1
Note: MSA(15) should always be set to O.

2-180

6.0 Control Information (Continued)
6.5.2 Group Addresses
The Ring Engine supports detection of Group Addresses within programmable and fixed blocks of consecutive addresses. The
algorithm used by the Ring Engine first performs a comparison between the most significant bits of the received DA with
programmable and fixed addresses. If the most significant bits match, the remaining bits are used as an index into a programmable bit map. If the indexed bit is 1, the A Flag is set to 1; if the indexed bit is 0 the A flag remains O.
One programmable block of 128 group addresses is supported for group long addresses (GLA) and one programmable block of
group addresses is supported for group short addresses (GSA). Both of the programmable ranges share the same programmable group address map (PGM).
For short addresses, the first byte of a received DA is compared with GSAO (bits GSA(15-8)}. If they match then the second
byte is used as an index into the PGM. For long addresses the first 5 bytes of a received DA are compared with GLAO through
GLA4 (bits GLA(47-8)}. If all 5 of these bytes match the corresponding byte in the received DA, then the 6th byte of the
received DA is used as an index into the PGM. The last byte of the address is used as an index into the PGM in both long and
short group addressing.
A fixed block of 16 group addresses is supported for both long and short addresses at the end of the address space that
includes the Universal/Broadcast address (FF ... FF). For short addresses, if the first 12 bits of the received DA are all 1 's then
the last 4 bits are used as an index into the 16-bit Fixed Group Map (FGM). Similarly, for long addresses if the first 44 bits are all
1's, the last 4 bits are also used as an index into the 16-bit FGM.
The Group Addresses should be valid for at least 12 byte times before the Addressing Mode is enabled and should remain valid
for at least 12 byte times after the Addressing Mode is disabled in order to guarantee proper detection.
Bits ELA (Enable Long Addressing) and ESA (Enable Short Addressing) in the Option Register determine the address types that
will be recognized by this MAC.
Alternative group addressing schemes may be implemented using external matching logic that monitors the byte stream at the
PHY Interface. The result of the comparison is returned using the EA (External A-Flag) pin.

Group Long Address
Group Long Address (GLAO-GLA4) represents the first 5 bytes of the long address, bit GLA(47} to bit GLA(8}.
To disable Long Group Address matches, bits GLA(46-8} should be set to all 1 'so

ACCESS RULES
Address

Read

Write

48-4Ch

Stop Mode

Stop Mode

07

06

05

04

03

02

01

DO

GLAO

GLA(47}

GLA(46}

GLA(45}

GLA(44}

GLA(43}

GLA(42}

GLA(41}

GLA(40}

GLAl

GLA(39}

GLA(38}

GLA(37}

GLA(36}

GLA(35}

GLA(34}

GLA(33}

GLA(32}

GLA2

GLA(31}

GLA(30}

GLA(29}

GLA(28}

GLA(27}

GLA(26}

GLA(25}

GLA(24}

GLA3

GLA(23}

GLA(22}

GLA(21}

GLA(20}

GLA(19}

GLA(18}

GLA(17}

GLA(16}

GLA4

GLA(15}

GLA(14}

GLA(13}

GLA(12}

GLA(ll}

GLA(10}

GLA(9}

GLA(8}

Nole: Bit GLA(47) should always ba sat to ONE.

2-181

~

CD
N

C")

CD

a..

Q

r-----------------------------------------------------------------------------------------,
6.0 Control Information (Continued)
Group Short Address
Group Short Address (GSAO) represents the station's short 16-bit address, bit GSA(15) to bit GSA(8).
It is possible to disable Short Group Addressing by programming bits GSA(14-8) to all Ones.
ACCESS RULES
Address

Read

Write

4Eh

Stop Mode

Stop Mode

GSA4

07

06

05

04

03

02

01

00

GSA(15)

GSA(14)

GSA(13)

GSA(12)

GSA(11)

GSA(10)

GSA(9)

GSA(8)

Design Note: GSA(15) is not used in the comparison since the comparison will only be accomplished if the received OA(15) is a One.

Fixed Group Address MAP (FGMO-FGM1)
Ifthe first 44 bits of a long DA, DA(47-4), or ifthe first 12 bits of a short DA, DA(15-4) are 1, the last 4 bits of the DA, DA(3-0),
are used as an index into FGM.
The 4-bit index into FGM can be viewed in two different ways. It can be viewed as 4 bits selecting one of 16 bits where the
hexidecimal equivalent of DA(3-0) can be used as the index. For example the broadcast address would index FGM(F). Alternatively it can be viewed as one bit, DA(3), selecting the byte (FGMO or FGM1) and three bits, DA(2-0) selecting one of 8 bits
within a byte.
ACCESS RULES
Address

Read

Write

58-59h

Stop Mode

Stop Mode

FGMO
FGM1
Note: Bit FGM(F) must be set to One to ensure proper handling of frames with the Universal/Broadcast address including the SMT NSA frames. This is mandatory
for interoperability on an FOOl Ring.

2-182

C

6.0 Control Information

"'a

co

(Continued)

Co)

N

Programmable Group Address MAP (PGMO-PGM1F)

0)

If the first 40 bits of a long DA, DA(47-8), match the GLA or if the first 8 bits of a short DA, DA(15-8), match the GSA, the last 8
bits of the DA are used as an index into PGM.
The 8-bit index into PGM can be viewed in two different ways.
1. As B bits selecting one of 256 bits where the hexidecimal equivalent of DA(7 -0) can be used as the index. For example a DA
with the last byte as A2h indexes PGM(A2).
2. As 5 bits, DA(7-3), selecting the byte (PGMO to PGM1F) and three bits, DA(2-0) selecting one of B bits within a byte. For
example a DA with the last byte of A2h (10100010b) selects PGM14 bit 2.
It is possible to disable Long and Short Group Addressing by filling the Group Address Map with O's.
In REV 1 of the BMAC device, PGM(OO) to PGM(7F) are hardwired to 0 and are not accessible via the Control Interface. This
implies that group addresses with DA(7) = 0 can not be recognized.
In REV 2 of the BMAC device, PGM(OO) to PGM(7F) are set equal to PGM(BO) to PGM(FF) and are accessible via the Control
Interface. This implies that DA(7) of group addresses is a don't care.
ACCESS RULES
Address

Read

Write

70-7Fh

Stop Mode

Stop Mode

PGMO

07

06

05

04

03

02

01

DO

PGM(7)

PGM(6)

PGM(5)

PGM(4)

PGM(3)

PGM(2)

PGM(1)

PGM(O)

PGM1

PGM(F)

PGM(E)

PGM(D)

PGM(C)

PGM(B)

PGM(A)

PGM(9)

PGM(8)

PGM2

PGM(17)

PGM(16)

PGM(15)

PGM(14)

PGM(13)

PGM(12)

PGM(11)

PGM(10)

PGM3

PGM(1F)

PGM(1E)

PGM(1D)

PGM(1C)

PGM(1B)

PGM(1A)

PGM(19)

PGM(18)

PGM4

PGM(27)

PGM(26)

PGM(25)

PGM(24)

PGM(23)

PGM(22)

PGM(21)

PGM(20)

PGM5

PGM(2F)

PGM(2E)

PGM(2D)

PGM(2C)

PGM(2B)

PGM(2A)

PGM(29)

PGM(28)

PGM6

PGM(37)

PGM(36)

PGM(35)

PGM(34)

PGM(33)

PGM(32)

PGM(31)

PGM(30)

PGM7

PGM(3F)

PGM(3E)

PGM(3D)

PGM(3C)

PGM(3B)

PGM(3A)

PGM(39)

PGM(38)

PGM8

PGM(47)

PGM(46)

PGM(45)

PGM(44)

PGM(43)

PGM(42)

PGM(41)

PGM(40)

PGM9

PGM(4F)

PGM(4E)

PGM(4D)

PGM(4C)

PGM(4B)

PGM(4A)

PGM(49)

PGM(4B)

PGMA

PGM(57)

PGM(56)

PGM(55)

PGM(54)

PGM(53)

PGM(52)

PGM(51)

PGM(50)

PGMB

PGM(5F)

PGM(5E)

PGM(5D)

PGM(5C)

PGM(5B)

PGM(5A)

PGM(59)

PGM(58)

PGMC

PGM(67)

PGM(66)

PGM(65)

PGM(64)

PGM(63)

PGM(62)

PGM(61)

PGM(60)

PGMO

PGM(6F)

PGM(6E)

PGM(6D)

PGM(6C)

PGM(6B)

PGM(6A)

PGM(69)

PGM(68)

PGME

PGM(77)

PGM(76)

PGM(75)

PGM(74)

PGM(73)

PGM(72)

PGM(71)

PGM(70)

PGMF

PGM(7F)

PGM(7E)

PGM(7D)

PGM(7C)

PGM(7B)

PGM(7A)

PGM(79)

PGM(78)

2-183

......

_,-------------------------------------------------------------------------,

re

CO)

CD

a.
C

6.0 Control Information (Continued)
Programmable Group Address MAP (PGMO-PGM1F) (Continued)
ACCESS RULES
Address

Read

Write

60-6Fh

Stop Mode

Stop Mode

07

06

05

04

03

02

01

00

PGM10

PGM(B7)

PGM(B6)

PGM(B5)

PGM(B4)

PGM(B3)

PGM(B2)

PGM(B1)

PGM(BO)

PGM11

PGM(BF)

PGM(BE)

PGM(BD)

PGM(BC)

PGM(BB)

PGM(BA)

PGM(B9)

PGM(BB)

PGM12

PGM(97)

PGM(96)

PGM(95)

PGM(94)

PGM(93)

PGM(92)

PGM(91)

PGM(90)

PGM13

PGM(9F)

PGM(9E)

PGM(9D)

PGM(9C)

PGM(9B)

PGM(9A)

PGM(99)

PGM(9B)

PGM14

PGM(A7)

PGM(A6)

PGM(A5)

PGM(A4)

PGM(A3)

PGM(A2)

PGM(A1)

PGM(AO)

PGM15

PGM(AF)

PGM(AE)

PGM(AD)

PGM(AC)

PGM(AB)

PGM(AA)

PGM(A9)

PGM(AB)

PGM16

PGM(B7)

PGM(B6)

PGM(B5)

PGM(B4)

PGM(B3)

PGM(B2)

PGM(B1)

PGM(BO)

PGM17

PGM(BF)

PGM(BE)

PGM(BD)

PGM(BC)

PGM(BB)

PGM(BA)

PGM(B9)

PGM(BB)

PGM18

PGM(C7)

PGM(C6)

PGM(C5)

PGM(C4)

PGM(C3)

PGM(C2)

PGM(C1)

PGM(CO)

PGM19

PGM(CF)

PGM(CE)

PGM(CD)

PGM(CC)

PGM(CB)

PGM(CA)

PGM(C9)

PGM(CB)

PGM1A

PGM(D7)

PGM(D6)

PGM(D5)

PGM(D4)

PGM(D3)

PGM(D2)

PGM(D1)

PGM(DO)

PGM1B

PGM(DF)

PGM(DE)

PGM(DD)

PGM(DC)

PGM(DB)

PGM(DA)

PGM(D9)

PGM(DB)

PGM1C

PGM(E7)

PGM(E6)

PGM(E5)

PGM(E4)

PGM(E3)

PGM(E2)

PGM(E1)

PGM(EO)

PGM10

PGM(EF)

PGM(EE)

PGM(ED)

PGM(EC)

PGM(EB)

PGM(EA)

PGM(E9)

PGM(EB)

PGM1E

PGM(F7)

PGM(F6)

PGM(F5)

PGM(F4)

PGM(F3)

PGM(F2)

PGM(F1)

PGM(FO)

PGM1F

PGM(FF)

PGM(FE)

PGM(FD)

PGM(FC)

PGM(FB)

PGM(FA)

PGM(F9)

PGM(FB)

2-184

6.0 Control Information (Continued)
6.5.3 Claim Information: Requested Target Token Rotation Time (TREQ)
The Requested Target Token Rotation Time (TREQ) is stored in registers TREQO-TREQ3. TREQ(31-0) is represented as a
negative two's complement number. This value is transmitted in all Claim frames generated by the Ring Engine.
Bits TREQ(31-24) are always transmitted as and compared with FFh and bits TREQ(7-0) are always transmitted as and
compared with OOh, independent of the value stored in the MAC Parameter RAM. TREQ is therefore programmable with
20.48 p.s resolution and a maximum value of 1.34 seconds.
ACCESS RULES
Address

Read

Write

50-53h

Stop Mode

Stop Mode

07

06

05

04

03

02

01

DO

TREQO

TREQ(31)

TREQ(30)

TREQ(29)

TREQ(28)

TREQ(27)

TREQ(26)

TREQ(25)

TREQ(24)

TREQ1

TREQ(23)

TREQ(22)

TREQ(21)

TREQ(20)

TREQ(19)

TREQ(18)

TREQ(17)

TREQ(16)

TREQ2

TREQ(15)

TREQ(14)

TREQ(13)

TREQ(12)

TREQ(11)

TREQ(10)

TREQ(9)

TREQ(8)

TREQ3

TREQ(7)

TREQ(6)

TREQ(5)

TREQ(4)

TREQ(3)

TREQ(2)

TREQ(1)

TREQ(O)

6.5.4 Beacon Information: Transmit Beacon Type (TBT)
Transmit Beacon Type 0-3 (TBTO-3) represents the Transmit Beacon Type to be transmitted in the information field of a
Beacon frame.
When the Beacon state is reached as a result of a failed Claim process, the first byte of the Beacon Information field, bits
TBT31-24, are forced to Zero to produce a Beacon Type 0 as required by the MAC Standard. Bits TBT(23-0) are transmitted
as the rest of the Information field.
When the Beacon state is reached as a result of a Beacon Request (when Function.BCN is set), bits TBT(31-0) are transmitted
as the Information field. Bit TBT(O) is transmitted last.
ACCESS RULES
Address

Read

Write

54-57h

Stop Mode

Stop Mode

07

06

05

04

03

02

01

DO

TBTO

TBT(31)

TBT(30)

TBT(29)

TBT(28)

TBT(27)

TBT(26)

TBT(25)

TBT(24)

TBT1

TBT(23)

TBT(22)

TBT(21)

TBT(20)

TBT(19)

TBT(18)

TBT(17)

TBT(16)

TBT2

TBT(15)

TBT(14)

TBT(13)

TBT(12)

TBT(11)

TBT(10)

TBT(9)

TBT(8)

TBT3

TBT(7)

TBT(6)

TBT(5)

TBT(4)

TBT(3)

TBT(2)

TBT(1)

TBT(O)

•
2·185

9-

~
co
CO)

a.
C

.-----------------------------------------------------------------------------------------~

6.0 Control Information (Continued)
6.6 TIMER VALUES
The Ring Engine stores several timer values and thresholds used in normal operation. With the exception of TNEG. the timers
use an exponential expansion on a 4·bit value to produce a negative twos complement 24·bit value used by the Timer Logic.
The timer values are always readable and are writable in Stop Mode.
Asynchronous Priority Threshold (THSH1)
The Ring Engine currently supports one Asynchronous Priority Threshold (THSH1) in addition to the one at TTRT. The Asynchronous Priority Threshold is used in a magnitude comparison with THT when an Asynchronous Priority Request is presented
to the MAC Request Interface.
Bits 7-4 are always written to Zero and are always read as Zero.
When more than one threshold is used, the users of THSH1 have the lowest priority. All asynchronous transmissions are limited
by TTRT. If the Late Flag is set, no frames may be transmitted, regardless of the value of the Asynchronous Priority Threshold.
ACCESS RULES
. Address
87h

THSH1

Read

Write

Always

Stop Mode

I

07

06

05

04

03

02

01

00

Zero

Zero

Zero

Zero

THSH(3)

THSH(2)

THSH(1)

THSH(O)

THSH1(3-0)

Time remaining In THT
when token becomes unusable

0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F

10.24/-f.S
20.48/Ls
40.96/Ls
81.92/Ls
163.84/Ls
327.68/Ls
655.36/Ls
1.3107ms
2.6214ms
5.2429ms
10.486 ms
20.972 ms
41.943 ms (default)
83.886ms
167.77 ms
335.54ms

Warning: The default value may not be appropriate for aU values of TNEG.
In some cases, this could result in a request that is NEVER serviced.

2-186

6.0 Control Information (Continued)
Maximum Token Rotation Time (TMAX)
The Maximum Token Rotation Time (TMAX) denotes the maximum Target Token Rotation Time supported by this station.
TMAX is stored as a 4·bit value that is expanded to a binary exponential value. Bits 7-4 are ignored during write operations and
are always read as Zero.
TMAX has a maximum value of 1.34 seconds with a threshold of 40.96 x 2TMAX p,s. On a Master Reset (Function.MARST set
to One), TMAX is set to the value of Ch which corresponds to 167.772 ms, the default specified by the FOOl MAC Standard.
ACCESS RULES
Address
93h

TMAX

Read

Write

Always

Stop Mode

07

06

05

04

03

02

01

DO

Zero

Zero

Zero

Zero

TMAX(3)

TMAX(2)

TMAX(1)

TMAX(O)

TMAX(O-3)
0
1
2
3
4
5
6
7
8
9
A
B
C

0
E
F

Time

40.96 p,s
81.92 p,s
163.84 p,s
327.68 p,s
655.36 p,s
1.3107 ms
2.6214 ms
5.2429ms
10.486 ms
20.972ms
41.943 ms
83.886ms
167.77 ms (default)
335.54ms
671.09 ms
1.3422s

fI

2·187

~

!j
~

c

r---------------------------------------------------------------------------------,
6.0 Control Information (Continued)
Valid Transmission Time (TVX)
The Valid Transmission Timer (TVX) is used to increase the responsiveness of the ring to errors that cause ring recovery. The
TVX value denotes the maximum time in which a valid frame or token should be seen by this station. TVX is stored as a 4-bit
value that is expanded to a binary exponential value. Bits 7-4 are ignored during write operations and read as Zero ..
TVX has a maximum value of 1.34 seconds with a threshold of 40.96 X 2TVX p.s. On a Master Reset (Function.MARST is set to
One), TVX is set to the value of 6h which corresponds to 2.62 ms, the default by the FOOl MAC Standard.
ACCESS RULES
Address

Read

Write

97h

Always

Stop Mode

TVX

07

06

05

04

03

02

01

00

Zero

Zero

Zero

Zero

TVX(3)

TVX(2)

TVX(1)

TVX(O)

TVX(O-3)

Time

0
1
2
3
4
5
6
7
8
9
A
B
C
0
E
F

40.96 p.s
81.92 p.s
163.84 p.s
327.68 p.s
655.36 p.s
1.3107 ms
2.6214 ms (default)
5.2429ms
10.486ms
20.972ms
41.943ms
83.886ms
167.77ms
335.54ms
671.09ms
1.3422s

2-188

6.0 Control Information (Continued)
Negotiated Target Rotation Time (TNEG)
The Negotiated Target Rotation Time (TNEGO-3) is a 32·bit twos complement value. It is the result of the Claim Process. TNEG
is loaded either directly from the received Claim Information field (T_Bid-Rc) or via the Control Interface.
The first byte of TNEG (bits TNEG(31-24)) always contains FFh. TNEG has a maximum value of 1.34 seconds and a resolution
of 80 ns.
TRT is loaded with TNEG when the RinQ-Operational flag is set. TNEG is not automatically compared with TREQ when the
RinQ-Operational flag is set. This should be checked by software whenever the ring becomes operational to make sure that
TNEG is less than or equal to TREQ.
An implementation of the SM_Control.Request (Reset) should load TNEG with TMAX to remove any possibility of the station
entering Claim early.
On a Master Reset (Function.MARST is set), TNEG is set to FFEOOOOO, which corresponds to 167.772 ms, the default TMAX
specified by the FDDI MAC Standard.
ACCESS RULES
Address

Read

Write

98-9Bh

Always

Stop Mode

D7

D6

DS

D4

D3

D2

D1

DO

TNEGO

TNEG(31)

TNEG(30)

TNEG(29)

TNEG(28)

TNEG(27)

TNEG(26)

TNEG(25)

TNEG(24)

TNEG1

TNEG(23)

TNEG(22)

TNEG(21)

TNEG(20)

TNEG(19)

TNEG(18)

TNEG(17)

TNEG(16)

TNEG2

TNEG(15)

TNEG(14)

TNEG(13)

TNEG(12)

TNEG(11)

TNEG(10)

TNEG(9)

TNEG(8)

TNEG3

TNEG(7)

TNEG(6)

TNEG(5)

TNEG(4)

TNEG(3)

TNEG(2)

TNEG(1)

TNEG(O)

EI

2·189

~

~
co
CO)

a.
C

,-----------------------------------------------------------------------------------------,
6.0 Control Information (Continued)
6.7 EVENT COUNTERS
The Event Counters are used to gain access to the internal 20·bit counters u'sed to gather statistics.
The following event counters are included:
• Frame Received Counter (FRCT1-3)
• Error Isolated Counter (EICT1-3)
• Lost Frame Counter (LFCT1-3)
• Frame Copied Counter (FCCT1-3)
• Frame Not Copied Counter (FNCT1-3)
• Frame Transmitted Counter (FTCT1-3)
• Token Received Counter (TKCT1-3)
• Ring Latency Counter (RLCT1-3)
• Late Count Counter (LTCT)
6.7.1 Processing Procedures
The counters are 20·bit wrap·around counters except for the Late Count Counter which is a 4·bit sticky counter (see Figure 6·2).
Since the Control Bus Interface is an a·bit interface and the counters are 20·bits wide, a register holding scheme is implement·
ed. In order to provide a conSistent snapshot of a counter, while the least significant byte is read, the upper 12 bits are loaded
into a holding which can then be read. The least significant byte must be read first.
The Counters are always readable and are writable in Stop Mode., The Counters are not reset as a result of a Master Reset. This
may be done by either reading the Counters out and keeping track relative to the initial value read, or by writing a value (Zero) to
all of the Counters in Stop Mode. The Counters may be written in any order. Interrupts may be requested when the counters
increment (except for Ring Latency Counter) or wrap·around (except for Ring Latency Counter and Late Count Counter).

..

..
..
""

FRRCV

Overflow

Increment

FRRCV

..

FREI

Overflow

Increment

FREI

.c

FRlST

Overflow

Increment

FRlST

~

FRCOP

Overflow

Increment

FRCOP

1:

'E
!I!
0

.
.s

FRNCOP

Overflow

Increment

FRNCOP

c

FRTRX

Overflow

Increment

FRTRX

.
1l

TKRCVD

Overflow

Increment

TKRCVD

il.,.
""u
:3

.3"

il.,.
.c

~

..

E
~
u

.E

.3"

START RING LATENCY
l TCT Increment

Holding

Regr-l~st-ers--...,..--L---.---....I.---.,

Counters Must be Read In this order (3,2, 1)
TLlF/10387-10

FIGURE 6·2. Event Counters

2·190

r----------------------------------------------------------------------, C

~

6.0 Control Information (Continued)

Co)

Frame Received Counter (FRCn
The Frame Received Counter (FRCn is specified in the FDDI MAC Standard. It is the count of all complete frames received
including MAC frames, Void frames and frames stripped by this station.
Interrupts are available on increment (CILR.FRRCV) and when the 20-bit counter overflows and wraps around (COLR.FRRCV).
ACCESS RULES
Address

Read

Write

AO-A3h

Always

Stop Mode

07

06

05

04

03

02

01

00

FRCTO

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

FRCT1

Zero

Zero

Zero

Zero

CT(19)

CT(18)

CT(17)

CT(16)

FRCT2

CT(lS)

CT(14)

CT(13)

CT(12)

CT(ll)

CT(10)

CT(9)

CT(8)

FRCT3

CT(7)

CT(6)

CT(S)

CT(4)

CT(3)

CT(2)

CT(l)

CT(O)

2-191

...
N

Q)

.-

I
Q

,---------------------------------------------------------------------------------,
6.0 Control Information (Continued)
Error Isolated Counter (EICT)
The Error Isolated Counter (EICn is specified in the FOOl MAC Standard. It is the count of aU error frames detected by this
station and no previous station.
It is incremented when:
1) an FCS error is detected and the received Error Indicator (Er) is not equal to S; or
2) a frame of invalid length (i.e., off-boundary n is received and Er is not equal to S; or
3) Eris not R orS
Interrupts are available on increment (CILR.FREI) and when the 20-bit counter overflows and wraps around (COLR.FREI).
ACCESS RULES
Address

Read

WrIte

A4-A7h

Always

Stop Mode

02

07

06

05

EICTO

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

EICT1

Zero

Zero

Zero

Zero

CT(19)

CT(18)

CT(17)

CT(16)

EICT2

CT(15)

CT(14)

CT(13)

CT(12)

CT(11)

CT(10)

CT(9)

CT(8)

EICT3

CT(7)

CT(6)

CT(5)

CT(4)

CT(3)

CT(2)

CT(1)

CT(O)

D4

2-192

03

01

00

6.0 Control Information (Continued)
Lost Frame Counter (LFCn
The Lost Frame Counter (LFCT) is specified in the FDDI MAC Standard. It is the count of all instances where a Format Error is
detected in a frame or token such that the credibility of the PDU reception is in doubt.
The Lost Frame Counter is incremented when any symbol other than a data or Idle symbol is received between the Starting and
Ending Delimiters of a PDU (this includes parity errors).
Interrupts are available on increment (CILR.FRLST) and when the 20·bit counter overflows and wraps around (COLR.FRLST).
ACCESS RULES
Address

Read

Write

AS-ABh

Always

Stop Mode

07

06

05

04

03

02

01

00

LFCTO

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

LFCT1

Zero

Zero

Zero

Zero

CT(19)

CT(1S)

CT(17)

CT(16)

LFCT2

CT(15)

CT(14)

CT(13)

CT(12)

CT(11)

CT(10)

CT(9)

CT(S)

LFCT3

CT(7)

CT(6)

CT(5)

CT(4)

CT(3)

CT(2)

CT(1)

CT(O)

In REV 1 of the BMAC device the Lost Count includes frames stripped on an ODD symbol boundary. This may cause larger than
expected counts in Rings where an upstream station produces valid remnants that begin on an ODD symbol boundary. (The
Ring Engine converts these remnants to byte aligned remnants, so that only the downstream station would increment its Lost
Count.) In subsequent revisions remnants that begin on an odd symbol boundary are not considered lost frames and do not
cause the Lost Count to increment.

2·193

...

re

Cf)

co
a,. ,
C

.---------~--------------------~--------~------------------------------------------,

6.0 Control Information (Continued)
Frame Copied Counter (FCCT)
The Frame Copied Counter (FCCT) maintains the count of the number of frames successfully copied by this station. This
counter can be used to accumulate station performance statistics.
The Frame Copied Counter is incremented when an internal or external match occurs on the Destination Address, no errors
were detected in the frame, and the frame was successfully copied (VCOPY signal is asserted). Copied MAC and Void frames
are not included in this count.
For 8MT N8A frames, the Frame Copied Count only increments for N8A frames received with the A Indicator as an R symbol for
which the frame was copied. 8MT N8A frames received with the A Indicator as an 8 do not cause this count to increment, even
if the frame is successfully copied.
Increments are available on increment (CILR.FRCOP) and when the 20-bit counter overflows and wraps around
(COLR.FRCOP).
ACCESS RULES
Address

Read

Write

AC-AFh

Always

Stop Mode

07

06

05

04

03

02

01

00

FCCTO

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

FCCT1

Zero

Zero

Zero

Zero

CT(19)

CT(18)

CT(17)

CT(16)

FCCT2

CT(15)

'CT(14)

CT(13)

CT(12)

CT(II)

CT(10)

CT(9)

CT(8)

FCCT3

CT(7)

CT(6)

CT(5)

CT(4)

CT(3)

CT(2)

CT(I)

CT(O)

2-194

6.0 Control Information (Continued)
Frame Not Copied Counter (FNCT)
The Frame Not Copied Counter (FNCn maintains a count of the number of frames intended for this station that were not
successfully copied by this station. This count can be used to accumulate station performance statistics such as insufficient
buffering or deficient frame processing capabilities for frames addressed to this station.
The Frame Not Copied Counter is incremented when an internal or external match (when Option.EMIND enabled) occurs on the
Destination Address, no errors were detected in the frame, and the frame was not successfully copied (VCOPV Signal not
.
asserted). Not Copied MAC frames and Void frames are not included in this count.
Interrupts are available on increment (CILR.FRNCOP) and when the 20-bit counter overflows and wraps around
(COLR.FRNCOP).
ACCESS RULES
Address

Read

Write

BO-BSh

Always

Stop Mode

FNCTO

07

06

05

04

03

02

01

DO

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

FNCT1

Zero

Zero

Zero

Zero

CT(19)

CT(1B)

CT(17)

CT(16)

FNCT2

CT(15)

CT(14)

CT(1S)

CT(12)

CT(11)

CT(10)

CT(9)

CT(B)

FNCT3

CT(7)

CT(6)

CT(5)

CT(4)

CT(S)

CT(2)

CT(1)

CT(O)

In REV 1 of the BMAC device, the Frame Not Copied Counter does increment for all NSA frames received with the A indicator
as an S symbol, if it was copied or not. This will result in higher than expected values in the Not Copied Counter. To obtain a
more accurate value with REV 1 of the BMAC device, the number of copied NSA frames received with the A Indicator set should
be subtracted from the value in the Not Copied Counter.
In subsequent revisions of the BMAC device, NSA frames received with the A Indicator as S that are not copied will not be
counted.
In REV 2 the handling of SMT NSA has been modified in accordance with the MAC-2 Draft Standard. For SMT NSA frames, the
Frame Not Copied Count only increments for NSA frames received with the A Indicator as an R symbol for which the frame was
not copied. SMT NSA frames received with the A Indicator as an S do not cause this count to increment, even if the frame is not
successfully copied. Group addressed frames transmitted by this station and recognized by this station that are not copied will
also cause this counter to increment.

2-195

,.. r---------------------------------------------------------------------------------,
~

f
c

6.0 Control Information (Continued)
Frame Transmitted Counter (FTCT)
The Frame Transmitted Counter (FTCT) maintains the count of frames transmitted successfully by this station. The counter can
be used to accumulate station performance statistics.
The Frame Transmitted Counter is incremented everY time a complete frame is transmitted from the MAC Request Interface.
MAC'and Void frames generated by the Ring Engine are not included in the count.
Interrupts are available on increment (CILR.FRTRX) and when the 20·bit counter overflows and wraps around (COLR.FRTRX).
ACCESS RULES
Address

Read

Write

B4-B7h

Always

Stop Mode

FTCTO

07

06

05

04

03

02

01

00

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero
CT(16)

FTCT1

Zero

Zero

Zero

Zero

CT(19)

CT(1B)

CT(17)

FTCT2

CT(15)

CT(14)

CT(13)

CT(12)

CT(11)

CT(10)

CT(9)

CT(8)

FTCT3

CT(7)

CT(6)

CT(5)

CT(4)

CT(3)

CT(2)

CT(1)

CT(O)

2·196

.----------------------------------------------------------------------.0
;g

6.0 Control Information (Continued)

w

Token Received Counter (TKCT)
The Token Received Counter (TKCn maintains the count of valid tokens received by·this station. The counter can be used with
the Ring Latency Counter to calculate the average network load over a period of time. The frequency of token arrival is inversely
related to the network load.

....~

The Token Received Counter is incremented every time a valid token arrives.
Interrupts are available on increment (CILR.TKRCVD) and when the 20-bit counter overflows and wraps around
(COLR.TKRCVD).

ACCESS RULES
Address

Read

Write

BS-BBh

Always

Stop Mode

TKCTO

07

06

05

04

03

02

01

00

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

TKCT1

Zero

Zero

Zero

Zero

CT(19)

CT(1S)

CT(17)

CT(16)

TKCT2

CT(lS)

CT(14)

CT(13)

CT(12)

CT(1l)

CT(10)

CT(9)

CT(S)

TKCT3

CT(7)

CT(6)

CT(S)

CT(4)

CT(3)

CT(2)

CT(l)

CT(O)

fII

2-197

.- r------------------------------------------------------------------------------------------,

CD
C"I

Cf)

CO

a.
C

6.0 Control Information (Continued)
Ring Latency Counter (RLCT)
The Ring Latency Counter (RLCT) is a measurement of time for PDUs to propagate around the ring. This counter contains the
last measured ring latency whenever the RLVD bit of the Token and Timer Event Latch Register (TELR.RLVD) is One.
The current ring latency is measured by timing the propagation of a My_Void frame around the ring. A new latency measurement can be requested by clearing the Ring Latency Valid bit of the Token Event Register (TELR.RLVLD).
When the ring is operational, the next early token is captured. Before the token is re-issued, a My_Void frame is transmitted and
the Ring Latency Counter (RLCn is reset. The token will not be captured if the Inhibit Token Option (Option.ITG) is set and the
ring latency will not be measured.
When the ring is not operational, ring latency timing will commence at the end of the next immediate request. A My_Void is
transmitted and RLCT is reset. This could be used to time how long the ring is non-operational since the My_Void frame will not
return.
The Ring Latency Counter increments once every 6 byte times from when the Ending Delimiter of the My_Void frame is
transmitted, until the Ending Delimiter of the My_Void frame returns. When the My_Void frame returns, the ring latency valid bit
(TELR.RLVLD) is set and may cause an interrupt. When set, RELR.RLVLD indicates that RLCTwili be valid within 1.28I£s. The
Ring Latency Counter can measure ring latencies up to I.S421772 seconds with accuracy of 1.28 I£s.
The ring latency timing function is automatically disabled when exceptions are detected and retried at the next opportunity.
Since a Master Reset (Function.MARSn causes TELR.RLVLD to be cleared, the ring latency will automatically be measured on
the first opportunity (at the end of the first immediate request or with the first early token).

ACCESS RULES
Address

Write

Read

BC-BFh,

Always

Stop Mode

07

06

05

04

RLCTO

Zero

Zero

Zero

Zero

Zero

Zero

Zero

Zero

RLCTI

Zero

Zero

Zero

Zero

CT(19)

CT(18)

CT(17)

CT(16)

RLCT2

CT(15)

CT(14)

CT(IS)

CT(12)

CT(II)

CT(10)

CT(9)

CT(8)

RLCT3

CT(7)

CT(6)

CT(5)

CT(4)

CT(S)

CT(2)

CT(I)

CT(O)

03

02

01

00

In REV 1 of the BMAC device, the Latency Counter is not reset to Zero when a new latency measurement is initiated. The
latency count will be the difference between the value of RLCT after the measurement is complete and the value of RLCT
before the measurement was initiated.
If a new latency measurement causes the latency counter to overflow, the new latency value will be less than the previous value.
In this case, no subtraction is necessary. The new value is equal to the ring latency. This is because the Ring Engine recognizes
the overflow condition and restarts the latency count from zero.
It is not possible to reset the Latency counter in software once the BMAC device has been put into RUN mode (Mode. Run = 1).
This counter is only writable while in STOP mode (Mode. Run = 0).

2-198

C

"tJ

co
Co)

6.0 Control Information (Continued)

N

Late Count (LTCT)

Late Count is provided to assist Station Management in the isolation of serious ring errors. In many situations, it is helpful for
SMT to know how long it has been since the ring went non-operational in order to determine if it is necessary to invoke recovery
procedures. When the ring becomes non-operational, there is no way to know how long it will stay non-operational, therefore a
timer is necessary. If the Late Count Counter is not provided, SMT would be forced to start a timer every time the ring goes nonoperational even though it may seldom be used. By using the provided Late Count Counter, an SMT implementation may be able
to alleviate this additional overhead.
Late Count is incremented every time TRT expires while the ring is non-operational and Late_Flag is set (once every TMAX).
This counter is never writable, not even in Stop Mode. The counter is set to Zero as a result of a MAC Reset when a Beacon or
Claim Request is not also present (Function.MCRST is set and Function.BCN and Function.CLM are not set) and every time the
ring becomes non-operational. The Late Count Counter is a sticky counter at 15.
Events reported in the Token and Timer Event Latch Register (TELR.CBERR, TELR.TRTEXP) can be used to determine that
Late Count Counter has incremented. No overflow event is provided.
ACCESS RULES
Address

Read

Write

OFh

Always

n/a

LTCT

....
Q)

The Late Count Counter (LTCn is implemented differently than suggested by the FDDI MAC Standard, but provides similar
information. The function of the Late Count Counter is divided between the Late_Flag and a separate counter. The Late_Flag
is equivalent to the Standard Late Count with a non-zero value. It is maintained by the Ring Engine to indicate if it is possible to
send asynchronous traffic. When the ring is operational, Late Count indicates the time it took the ring to recover the last time the
ring went non-operational. When the ring is non-operational, Late Count indicates the time it has taken (so far) to recover the
ring.

07

06

05

04

03

02

01

DO

Zero

Zero

Zero

Zero

CT3

CT2

CT1

CTO

2-199

I
Q

7.0 Signal Descriptions
Interface Organization
The BMAC device signals are organized into five Interfaces:
Control Interface: Used for processor access to the BMAC device.
PHY Interface: Interface signals to the DP83251 155 PLAYER device.
MAC Indicate Interface: Signals for receiving and processing incoming frames.
MAC Request Interface: Signals used to capture tokens and transmit frames.
Electrical Interface: Signals associated with power supply and clocking.
Application Note 689, BMAC Device Hardware Design Guide, provides a discussion of design considerations and tradeoffs for
using the BMAC Device.
7.1 CONTROL INTERFACE
The Control Interface operates asynchronous to the operation of the data services. During an access, the external Control Bus
is synchronized with the internal Control Bus.
The ACK and INT signals are open drain signals to allow wire ORing several such signals.
Symbol

Pin #

1/0

Description

10

110

Control BU8 Parity: Odd parity on CBD7 -0.

CBD7-0

9-6,3-1,
132

110

Control BU8 Data

CBA7-0

131-129,
127-123

I

Control BU8 Addre..: Address of a particular register.

~

120

I

Control BU8 Enable: Handshake signal used to begin a Control Interface access. Active low signal.

R/W

119

I

Read/- Write: Determines current direction of a Control Interface access.

AOR

122

00

- Acknowledge: Acknowledges that the Control Interface access has been performed. Active low,
open drain signal.

!NT

121

00

-Interrupt: Indicates presence of one or more enabled condition(s) from the Event Registers.
Active low, open drain Signal.

CBP

2-200

7.0 Signal Descriptions (Continued)
7.2 PHY INTERFACE
The PHY Interface signals transfer symbol pairs between the BMAC and PLAYER devices. Transfers are synchronous using the
12.5 MHz Local Byte Clock signal (signal provided by the Clock Distribution Device).
A control bit is used to indicate if a Data symbol pair or Control symbol pair or a mixed Control/Data symbol pair are being
transferred.
Parity is generated on the PHY_Indicate and MA....Jndicate data. Parity is checked on the PHY_Request and MA-Request
data.
Pin #

I/O

PRP

114

0

PHY Request Parity: Odd parity for PRC and PRD7 -0.

PRC

112

0

PHY Request Control:

Symbol

Description

0: Indicates PRD7 -0 contains a Data symbol pair.
1: Indicates PRD7 -0 contains a Control or mixed Control/Data symbol pair.
PRD7-0

110,108,
105, 103,
99,97,
95,92

0

PHY Request Data: Contains a Data or Control symbol pair.

PIP

115

I

PHY Indicate Parity: Odd parity for PIC and PID7 -0.

PIC

113

I

PHY Indicate Control:
0: Indicates PID7 -0 contains a Data symbol pair.
1: Indicates PID7 -0 contains a Control or mixed Control/Data symbol pair.

PID7-0

111,109,
107,104,
102,98,
96,93

I

PHY Indicate Data: Contains a Data or a mixed Control/Data symbol pair.

fII

2·201

~

~

ell)

~

Q

r-------------------------------------------------------------------------------------,
7.0 Signal Descriptions (Continued)
7.2.1 PHY Interface Codes
The DPB3251/155 PLAYER device converts the Standard 4B/5B FDDI symbol code to the internal code used at the PHY
Interface. The PH_DATA.lndication table shows how the Ring Engine interprets the codes generated by the PLAYER device
and the PH-DATA. Request table shows the codes generated by the Ring Engine.
The internal code is actually an BB/9B code with parity where one bit is used to determine whether the symbol pair contains two
data symbols or at least one control. symbol.
PH-DATA.lndlcatlon
The Ring Engine interprets the byte stream the PLAYER device as defined in Table 7·1.
TABLE 7-1. Internal PHY Indicate Coding
PIP

PIC

PID(7-4)

PID(3-0)

Type

0

1

0

0000

0000

Data Symbol Pair
Data Symbol Pair

Value

where:
PIP

1

0

0

0000

0001

:

:

:

:

:

254

0

0

1111

1110

255

1

0

1111

1111

Data Symbol Pair

JK

P

1

1101

xxxx

Start Delimiter

PI

P

1

x011

x1xx

PH_Invalid

PI

P

1

x011

xx1x

PH_Invalid

II

P

1

10xx

xxxx

Idle Symbols

:
Data Symbol Pair

nl

P

1

0000

10xx

Data/Idle Symbol

RR

P

1

0110

0110

Frame Status

RS

P

1

0110

0111

Frame Status

RT

P

1

0110

0101

Frame Status

SS

P

1

0111

0111

Frame Status

SR

P

1

0111

0110

Frame Status

ST

P

1

0111

0101

Frame Status

SX

P

1

0111

xxxx

Frame Status

TX

P

1

0101

xxxx

Ending Delimiter

TR

P

1

0101

0110

Ending Delimiter

TS

P

1

0101

0111

Ending Delimiter
Ending Delimiter

TT

P

1

0101

0101

nT

P

1

0000

0101

Mixed Symbol Pair

Parity Error

-P

0

1??1

1111

Code Violation

Otherwise

1

1

Else

Code Violation

PHY Indicate Parity bit, ODD parity

PIC

PHY Indicate Control bit:
0= > data byte,
1 = >control/mixed byte
PID(7-0) PHY Indicate Data(7-0)
P

represents ODD Parity ( - P is Bad Parity)

x1

represents a don't care and is not decoded
represents a 1 or 0 but not both.

The PLAYER device aligns the received JK to a byte boundary. Thus, no provision is made in the internal code or by the Ring
Engine for off boundary JKs.
The Idle and PH_Invalid encodlngs overlap. Idle symbols received while the PLAYER device is in Active Line State (ALS) or Idle
Line State (ILS) are not considered PH_INVALID. Idle symbols received while the PLAYER device is in states other than ALS or
ILS are treated as PH_Invalid.

2·202

,----------------------------------------------------------------------, C

~

7.0 Signal Descriptions (Continued)

W
N

PH_OATA.Request
The Ring Engine generates the 10 bit byte stream as defined in Table 7-2. Note that all symbol pairs are either control or data
symbol pairs. Mixed data/control symbol pairs are never generated or repeated by the Ring Engine.
TABLE 7-2. Internal PHY Request Coding
Value

PRP

PRC

PRO(7-4)

PRO(3-0)

Type

0

1

0

0000

0000

Data Symbol Pair

1

0

0

0000

0001

Data Symbol Pair

:

:

:

:

:

:

254

0

0

1111

1110

Data Symbol Pair

255

1

0

1111

1111

Data Symbol Pair

JK

0

1

1101

1101

Start Delimiter

II

0

1

1010

1010

Idle Symbols

RR

0

1

0110

0110

Frame Status

RS

1

1

0110

0111

Frame Status

RT

0

1

0110

0101

Frame Status

SS

0

1

0111

0111

Frame Status

SR

1

1

0111

0110

Frame Status

ST

1

1

0111

0101

Frame Status

TR

0

1

0101

0110

Ending Delimiter

TS

1

1

0101

0111

Ending Delimiter

IT

0

1

0101

0101

Ending Delimiter

Where:
PRP
PRC

....
Q)

PHY Request Parity bit, parity for all symbol pairs is ODD
PHY Request control bit:
0= > data byte

1 = > control byte
PRD(7 -0) PHY Request Data (7-0)
The Ring Engine can repeat the RS, RT and ST symbol pairs but does not create them.

2-203

.- r-----------------------------------------------------------------------------------------,

re

CO)

CD

a.
C

7.0 Signal Descriptions (Continued)
7.3 MAC INDICATION INTERFACE
The MAC Indication Interface provides a delayed version of the byte stream presented to the Ring Engine at the PHY Indication
Interface. Every byte of all incoming frames is presented at the MAC Indication Interface. Every byte time (80 ns) one byte of
data with Odd parity is presented at the MAC Indication Interface. This byte stream is interpreted by the system interface logic
using the control signals that are provided in parallel with the byte stream. These control signals are used to determine frame
boundaries in the byte stream, determine whether or not to (continue to) copy a frame, and to provide status on received PDUs.
In the following sections, an overview of the signals is provided (Section 7.3.1) as well as a detailed explanation (Section 7.3.2)
with several example timing scenarios (Section 7.3.3).
7.3.1 Overview
The MAC Indication Interface is divided into one group of data signals and five groups of control signals.
The data signals consist of the 8 bits of MAC Indicate Data (MID) with parity.
The control signals consist of 5 groups:
• PDU Sequencing to aid in delimiting PDUs from the byte stream and sequencing through fields in the received PDUs.
• PDU Flags to aid in the decision of whether or not to continue to copy a PDU.
• Termination Event to determine when and how a PDU terminated.
• Termination Status to provide status on received frames.
• External Flags to allow external address comparison and copy information to be conveyed back to the Ring Engine.
The PDU Sequencing signals are asserted at different pOints within a PDU.
RCSTART when the Starting Delimiter is present on MID
FCRCVD

when the Frame Control Field is on MID

DARCVD

when the last byte of the DA is on MID until the next Starting Delimiter

SARCVD

when the last byte of the SA is on MID until the next Starting Delimiter

INFORCVD when the fourth byte of the info field is on MID until the next Starting Delimiter
Not all of the sequencing signals would be used in a typical implementation.
The PDU Flags provide the input for potential copy criteria and status breakpoints. The results of the comparisons between the
station's long or short address and the frame's source and destination addresses are provided in the AFLAG and MFLAG
signals. The sequencing information is used to determine when this information is valid. Since the Ring Engine is capable of
accomplishing four internal comparisons on any given frame, two signals give the internal comparison that was accomplished.
AFLAG

Internal DA Match. There are actually four AFLAGs as determined by the two signals: FCSL-Short/Long, DAIGIndividual/Group. Valid with DARCVD.

MFLAG

Internal SA Match. There are actually two MFLAGs as determined by the values of FCSL. Valid with SARCVD.

SAMESA

SA same as in previous frame. Valid with SARCVD on Non-MAC frames. Can be used by external logic to batch
status or reduce the number of interrupts when multiple frames are received from the same station.

SAMEINFO First four bytes of Info same as in previous frame. Valid with INFORCVD on MAC frames. Can be used to inhibit
copying of identical MAC frames.
No temporary buffering is provided in the Ring Engine. The system interface must provide this buffering while the decision is
made on whether or not to continue to copy the frame.
Termination Event: One of these signals is asserted at the end of every PDU:
EDRCVD

when the Ending Delimiter is on MID until the end of the Frame Status (typically asserted for two byte times)

TKRCVD

when the Ending Delimiter of a token is on MID

FRSTRP

when the first Idle byte of a stripped frame is on MID

FOERROR when the byte with the format error is on MID
MACRST

when a MACRST occurs or Ring Engine in Stop Mode

2-204

7.0 Signal Descriptions (Continued)
Termination Status: These signals provide status on reception of a valid ending delimiter on a frame.

VDL

Valid Data Length.
Criteria:
1. more than the minimum number bytes
2. integral number of symbol pairs.
Valid with EDRCVD

VFCS

Valid FCS Criteria: Received FCS matches with standard CRC polynomial.
Valid with EDRCVD

External Flags: These signals are used for setting the outgoing control indicators, the interface accepts:
EA
For external address matches for the setting of the A indicator (bridging, Group addressing, Aliasing)
VCOPY

For the setting of the C Indicator when AFLAG or EA is set.

•
2-205

7.0 Signal Descriptions (Continued)
7.3.2 Signals
All output signals change relative to the rising edge of the Local Byte Clock signal (provided by the Clock Distribution Device)
and are active high.
7.3.2.1 Indication Data
Symbol
MIP
MID7-0

Pin

;I'

Description

1/0

73

0

MAC Indicate Parity: Odd parity on MID7-0. Only valid with Data and Status Indicators.

74-76,
79-83

0

MAC Indicate Data:
Data: Indicates data is being presented on MID7 -0 between the rising edge of Frame Control Receive
FCRCVD and the rising edge of one of the following signals:
Ending Delimiter Received (EDRCVD),
Token Received (TKRCVD),
Format Error (FOERROR),
Frame Strip (FRSTRP),
or MAC Reset (MACRST).
Status: Indicates Status Indicators are being presented on MID7 -0 while Ending Delimiter Received
(EDRCVD) or Token Received (TKRCVD) is asserted.

The Contents and interpretation of MID7-0 are given in Table 7·3.
TABLE 7·3. MAC Indication Coding
Contents

Value

MID(7-4)

MID(3-0)

Data

0
1
2
:
:
254
255

0
0
0
:
:
F
F

0
1
2
:
:
E
F

Status

TT
TR
TS
TX
nT
RT
RR
RS
ST
SR
SS

5
5
5
5
0
6
6
6
7
7
7

5
6
7
*5,60r7
5
5
6
7
5
6
7

otherwise

x

x

undefined

2·206

Condition
Between RCSTART and
EDRCVDor
TKRCVDor
FRSTRPor
FOERRORor
MACRST
with EDRCVD or TKRCVD
withEDRCVD
with EDRCVD
withEDRCVD
withEDRCVD
withEDRCVD
withEDRCVD
withEDRCVD
withEDRCVD
withEDRCVD
withEDRCVD
otherwise

C

"tJ

7.0 Signal Descriptions (Continued)

CD
W
N

7.3.2.2 PDU Sequencing
The PDU Sequencing signals apply to the data and status available at the MAC Indicate Interface. They are used to determine
the validity of the data (MID7 -0) and parity (MIP). In addition the sequencing signals are used to determine the validity of the
Addressing Flags, and the Frame Status such as the Control Indicators. All timing is explained relative to the byte present on the
MAC Indicate Interface.
Symbol

Pin #

1/0

RCSTART

51

0

Receive Start: Indicates that a MAC PDU Starting Delimiter has been received. It is asserted when
the Starting Delimiter is present at the MAC Indicate Interface.

FCRCVD

52

0

Frame Control Received: Indicates that the Frame Control field is present. It is asserted when the
Frame Control field is present at the MAC Indicate Interface.

DARCVD

55

0

Destination Address Received: Indicates that the Destination Address has been received. It is
asserted on the last byte of the Destination Address and remains asserted until the next PDU Starting
Delimiter is received.

SARCVD

59

0

Source Address Received: Indicates that the Source Address has been received. It is asserted on
the last byte of the Source Address and remains asserted until the next PDU Starting Delimiter is
received.

INFORCVD

62

0

Information Field Received: Indicates that four bytes of the Information field have been received. It
is asserted on the fourth byte of the INFO field and remains active until the next PDU Starting
Delimiter is received.

Description

2·207

Q)
.....

7.0 Signal Descriptions (Continued)
7.3.2.3 PDU Flags
The PDU flags may be used with the received Frame Control field to determine if an attempt should be made to copy the frame.
Pin ..,

I/O

AFLAG

56

0

My Destination Address Recognized: Indicates that an internal address match occurred on the
Destination Address field. The internal address (MSA, MLA, GSA, GLA) match is indicated by the
assertion of FCSL and DAIG. AFLAG is asserted along with DARCVD. It is reset when the next PDU
Starting Delimiter is received.

DAIG

54

0

Individual/Group Address Flag: Indicates the address type. Valid on the first byte of the Destination
Address.

Symbol

Description

0: Individual Address
1: Group Address
FCSL

53

0

Short/Long Address Flag: Indicates the size of the Destination Address. Signal is valid when
FCRCVD is asserted.
0: Short Address
1: Long Address
Used in conjunction with TKRCVD to indicate the type of token received.
0: Non-restricted token
1: Restricted token

MFLAG

60

0

My Source Address Recognized: Indicates that the received Source Address field matched the
MLA or MSA. SA.lG is ignored in the comparison. MFLAG is asserted along with SARCVD. It is reset
when the next PDU Starting Delimiter is received.

SAMESA

61

0

Same Source Address: Indicates three conditions:
1. The Source Address of the current frame is the same as the Source Address of the previous frame
AND
2. The current and previous frames were not MAC frames AND
3. The current and previous frames have the same address field size.
SAMESA is asserted along with SARCVD. It is reset when the next PDU starting delimiter is received.

SAMEINFO

63

0

Same MAC Information: Indicates two conditions:
1. The first 4 bytes of the information field of the current frame are identical to the first 4 bytes of the
previous non-Void frame AND
2. The current and previous non-Void frames were MAC frames.
SAMEINFO is asserted along with INFORCVD. It is reset when the next PDU Starting Delimiter is
received.
Note that the FC field is not checked to insure that it is the same as in the previous frame. This
includes the address size comparison.
In REV1 of the BMAC Device Void frames are not ignored as stated in 1 and 2 above.

2-208

C

"tI

7.0 Signal Descriptions (Continued)

Q)

7.3.2.4 Termination Event

Q)

W
N

The terminating event for all PDUs is provided in the PDU Status signals.
When a token is terminated by a valid Ending Delimiter (TT symbol pair), the TKRCVD signal is asserted. When a frame is
terminated by a valid Ending Delimiter, the EDRCVD is asserted and remains asserted until all frame status has been passed to
the MA-Indicate Interface. Every PDU is terminated by one of the following:
1. A valid Ending Delimiter (TKRCVD or EDRCVD)
2. An IDLE symbol indicating that the frame was stripped by another station (FRSTRP)
3. A symbol other than data, Idle or an Ending Delimiter indicating that a Format Error occurred (FOERROR)
4. A MAC Reset (MACRST)
Pin #

I/O

TKRCVD

Symbol

69

0

Token Received: Indicates that the Ending Delimiter for a valid token is being received.

EDRCVD

66

0

Ending Delimiter Received: Indicates that the Ending Delimiter for a frame is being received. The
values of the received Status Indicators are available through the MID byte stream on this and
subsequent cycles while this signal is asserted.

FRSTRP

71

0

Frame Stripped: Indicates that an Idle symbol was received while expecting part of a PDU. This
usually indicates that the PDU was stripped by an upstream station. This signal may be asserted
anytime during reception of a frame after RCSTART is asserted.

FOERROR

70

0

Format Error: Indicates that a Format Error (non· DATA, IDLE or Ending Delimiter Symbol) was
detected. This signal may be asserted anytime during reception of a frame including with RCSTART
for the next frame.

MACRST

72

0

MAC Reset: Indicates that a MAC Reset has been issued. This signal is asserted as a result of a
software or hardware reset, or internal errors. This signal is asserted whenever bit MCRST of the
Function Register is set. This signal may be asserted anytime.

Description

7.3.2.5 Termination Status
When a valid Ending delimiter is received after a valid starting delimiter, the termination status signals provided the results of the
Frame validity check and the Frame Check Sequence Check.
The received values of the control indicators are presented in the data stream while EDRCVD is asserted.
Pin #

I/O

VDL

68

0

Valid Data Length: Indicates that a frame meeting the minimum length requirements of the Standard
and of an even number of symbols was received. This signal is valid with EDRCVD.

VFCS

67

0

Valid Frame Check Sequence: Indicates that a frame with the standard CRC was received. This signal
is valid with EDRCVD.

Symbol

Description

2·209

......

7.0 Signal Descriptions (Continued)
7.3.2.6 External Flags
The External Flags provide input to the Ring Engine in order to set the A and C indicators or in order to initiate stripping based on
external logic.
Pin '"

110

Description

EA

38

I

External A.....Flag: Indicates that an external address match occurred. The value of EA is used to alter
the values of the transmitted A and C Indicators (Ax and Cx). EA must be valid one byte time before
EDRCVD is asserted. When the EMIND bit in the Option Register is set, the A Indicator is repeated as set
(S symbol) and either the Copied or Not Copied Frame Counter is incremented depending on the value of
VCOPY.

EM

39

I

External M_Flag: Indicates that the current frame should be stripped. Three byte times after the EM
signal is asserted, the Ring Engine begins to source Idle symbols and the frame is stripped.

VCOPY

85

I

Valid Copy: Indicates that the C Indicator (Cx) should be repeated as an S symbol for received frames
when VCOPY is asserted, the received frame is not an SMT NSA frame received with the A indicator as
Set and

Symbol

1. the internal A-flag is set or
2. Option.EMIND= 1 and the external A-flag (EA) is set;
See Section 5.5 for a complete description of the setting of the control indicators.
VCOPY must be valid one byte time before EDRCVD is asserted and remain asserted until EDRCVD is
asserted.
The sampled value of VCOPY with EDRCVD also affects the incrementing of the frame copied and frame
not copied counters. See the description of the event counters for more information.

2·210

7.0 Signal Descriptions (Continued)
7.3.3 Timing Examples
The following examples show the sequencing of signals at the MAC Indicate Interface for well formed frames, for stripped
frames and for several special cases. The diagrams show the logical operation of the interface with 0 ns delays. The actual
delays are specified in Section 8. Also, in place of specifying the actual values for the flags and inputs, the cycles where they are
valid (for outputs) or must be valid (for inputs) are shown.
Frame Reception
The examples shown in Figures 1-1 through 1-3 display normal frame reception for a frame with a Short Address and a frame
with a Long Address.
LBC
UID IDLE

R~~~

101..[

IDLl

IDlE

IJK

Ire

PAD

~I

SAD

:s-"

IHroO

INFOI

INF02

~r03

:[0

rs

!DlE

IDlE

:::::: IDLE

:JK

Fe

r--,~:--~'~~-------+'--------------+'------~--~'-------+--------------J~

------t----!~,....:-i_-_t------+--~_:i_-_t-----....;..-n
~SL ____________~--~~~~~~N~~Vlli~E~--~----------~----~~~----~------------t______

,CRCVO

~O

____________t_-+--t_~

AFUG __________________________~~.~W~.________________________~------------------------_+------~RCVO _____________+--~--+_~----___!

MRAG ______________

S~~

~~~~--~------L-~.=~=---------~----~--~------~------------+-------

_______________+--_r--~--~------~-V~Mm~--------_+------~--~------+-------------_+-------

INfORCVO ______________~---!---~--"!_------~------------~
~DNfO _______________+--_r--~--~------+_------------_+~·~W~.--~--~------_+--------------+_------

,

DmCVO ______________
~

~--~--~--"!_------~------------_+------~_:~--------------~----, ,

________________--__--__--__________--__________________~rwel~·~W~.~--______------_______+------_

VOOpy ______________
V,~

,

_+--~--~--+_------r_------------_+------~~~.~W~.~:------_+--------------+_------

____________________________________________________________

~~VMm~

_________________+_______

VOL ______________-+__-r__~--~------~------------_+------~--4_~VMm~--~------------_+------TLlF/10387-5

FIGURE 7-1. Frame Reception with Short Address

2-211

DP83261

LBe
MID

""

b

rL
ru

IDLE

RCSTART

IDLE

IDlE

JK

n

Fe

DAD

FCRCVD

.-------------+--~r___1,

FCSL

~'"'""l

DAt

rw:

OM

DA5

SAO

SAt

SA2

SAl

SA4

SA5

INroo

INFOt

1NF02

1NF03

ED

FS

fS

IDLE

r-L

en

is'
:::J
!!.
(I)
()

....

~-

L....:
r VALID
...--,.--...----r---------,-------------

-

-6'
0'

,

l---

-

---------------.-----r

,

,

U

SARCVD

IIFlAG

VALID

SAIIESA

VALID

:::J

(I)

g

a

__ : _________ _

I\l

INFDRCVD

.

.

.

.

r

SAllElNFD _

EDRCVD _ _ ,

:.
VAIl)

~--------------~----~~~Im

EA

{!¥I

VCOPV

tvm

~

B

B

IL-________~~~

C~

YDL

VALID

TUF/l03B7-B

FIGURE 7-2. Frame Reception with Long Address

:::I

<:

e

,

'l'

~

:.Ie : FC

NEW VALUE

DARCVD

mAG

:::::: III.E

~ cCD

~
',.,"'''.
".~ NEW VALUE

DAIG

DA3

c

-a

7.0 Signal Descriptions (Continued)

CD

Co)
I\)

en
....

LBC
MID IDLE

IDLE

IDLE

IDLE

Fe

JK

TT

IDLE

IDLE

JK

Fe

RCSTART

________~r_1~__________~

FCRCVD

__________~r_1~___________r_l
~
~

FCSL

TKRCVD

NEW VALUE (RESTRICTEO/NON)

______________~r-l~____________

EDRCVD
TL/F/l0SB7-B

FIGURE 7·3. Token Reception

Remnant Reception
In these examples, the remnants of frames that were stripped by an upstream station are received. Examples are shown for
frames where the strip point occurred at an upstream station before, during and after the SA field. (See Figures 7-4 through 7-6.)

LBC
MID IDLE

RCSTART

IDLE

IDLE

IDLE

,'JK

,'Fe

OM

,'IOLE

LE :::::::::: IDLE

,

:JK

,'Fe
,

--------~~r__~I-+--------~~----~~r-l
,

FCSL

~
, ,

DAIG

~~~

FRSTRP

DA3

-------~rl~
, ____------~~-----rlL_
,

FCRCVD

DA2

DAI

NEW;ALUE

,

NEW VALUE

~

--------~~~~--------~,

FIGURE 7·4. Frame Stripped before SA Field

2-213

,~----~~--

TLiF/103B7-9

DP83261
......

b

en

iQ"
::l

!!!.

c

C1)
(II

LBC

RCSTART

n

___n

MID IDLE

IDLE

IDLE

IDLE

DAI

DA2

DA3

DA4

SAO

SAl

SA2

SA3

IDLE

SA4

IDLE

rl-

-

"'"
ii"
0"
::l

(II

FCRCVD

FCSL

DAIG

"---------+~r_l
~ -

r-l

g>
3:i"
c:

~

~~ NEW VALUE

~
~'\.~ NEW VALUE

I\)

~

.... 1

u

DARCVD

r-vAUD

AFLAG

---~~

I

FRSTRP

~~~

____________~______________~r-l~______~~
I

TUF/103B7-12

FIGURE 7-5. Frame Stripped during SA Field

......
(:)

en

cO'
:::l

~

LBe
MID
RCSTART

FCRCVD

C
IDLE

IDLE

IDLE

IDLE

JK

, FC

______~r1

'DAD

'DAl

DA2

DA3

DM

'DA5

SAO

SAl

SA2

SA3

SA4

SA5

INFDD

INFDl

IDLE

IDLE

IDLE' JK

r-1

__________~r_1
~"\fNEW

FCSL

CD

, FC

~

VALUE

-_. - - -

----- -

:--:

en
(')

..,

-

ii'
0'
:::l
en
g>
::J

S"
c:

DARCVD

~I

CD

~~~ NEW VALUE

DAIG

.&

--------------+--+--+---------~r_
~

AFLAG

~

j

SARCVD

MFLAG

VALID

SAMESA

VALID
--

----

~~~--------~--------------~------~~~'------~~

FRSTRP

TLlF/10387-l3

FIGURE 7-6, Frame Stripped after SA Field

~9~£9dO

II

DP83261
"TI

....

iii •

:I

CD
UI

r:tca

LBC
MID 111£

IDlE

III.E

IILE

PRO DJI£

IDlE

IDLE

w:

:.1( ,,FC

DAD
I

SAO

SAl

IlAI

SAO

1lLE1ILE1ILE1DLE1lLE1lLE1lLE1lLE1lLE1lLE1OLE

I

DAD

INf06

IlAI

INFOO

INFOI

IIIf02

MOIl

14104

I4Ill5

1ml7

INf06

I

14F09

m

FS

IILE

IDLE

IDlE

IDLE

IDLE

IDlE

IlLE

IlLE

IILE

IDLE

,H
I

~

I

~
~

DAlG

~~~

~I

SARCYD

,FC

~

II)

CD

0

I

n

'2.

O·

:l

(II

~

a

NEW VALUE

:::1

r

1

-.=:::i
-I

I~

---------+~--~+---~.-

~,
, ~-

U

MFLAG

SAIIESA .

,

NEW VALUE

,----+-+---!---~-

AFLAG

,JK

I

FtsL

DARCYD -,

,

-6"
:l
:::I
_

t-L ~
:I.

H

ReSTART

en

Q

tn
_.

VAIJD

w

INFORCYD

I

VAUD

----

--- -----

I

SAllEiNFO
EIlRCYD _

~-~-~-+------------~---------------~Im

FS

IVAIJD

VFts _,

fYiLiD--

VIll _,

TUF/l03B7-14

FIGURE 7-7. Stripping Based on M Flag

L8C

IL.....I'--I.....,L...IL-IL....IL-IL--IL....IL....IL-I.....,.....,I.-I

PIO IDlE

JK

PC

DAD

OAl

SAO

SAl

MID

IDLE

IDLE

IDLE

IDLE

: JK

: Fe

: DAD

PRO

IDLE

IOLE

IDLE

IDLE

RCSTART

h
IJK

IFe

INroo INFOI
: DA 1

lOA!

SAO

......
IDLE
:IDLE

lNF'02

INF'03

INF04

INF'OS

IHf'OS

INto7

tHrOB

INF09

::::::::ED

rs

: SAl

tHFOO

INFOI

INF02

I~F03

INF04

lNfOS

INF06

INF07

tHrOB

INF09::::::

IDLE

IDLE

IDLE

IDLE

IDLE

IDLE

IDLE

IDLE

1Dl£

""
lOAD

I SAl

IIDLE

""oen

L-IL-IL--IL-i.....,

::::::

: ED

: rs

, ,
'IDlE

IIDlE

IDLE

IDL£

JK

Fe :::::::

IDlE

tDl[

::::::;

IDLE

IDLE

10lE

lOI...£

::::::: lDL£

1Dl£

: .II<

Fe

r--tIJ!(

n

FCRCVO

Fe

n



g-

-~---

c

CD

8:

AFLAG

VAUD

,

SARCVO

,

,

,

I\)

~
.....

MFLAG

VAUD

r~------

SAMESA

EM

_____-+_+--+---,1,

VAUD

-,-;-

I

IXXX~XXxxxxxxZm~ZXXXXXXXXXXXXXXXXXXXXXXXXX~XXj

INFORCVO

VALID

SAMEINFO

~~

EDRCVO

-

__~~____~__________~______________________~~rn

l~

-1

____________

~

I VAUD .-

VFCS

,~~

VOL

1
TLlF/10387-15

Note that stripping begins 3 byte times after EM is asserted.

FIGURE 7-8. Stripping Based on External M Flag

~9~£Sda

II

DP83261

» ......
•

t:J'
:I

3~

0

0_.

!!!.CQ
-of

!!l

:::J

s»

35· ~ CD
o tn
:I

c

LBC
MID IDLE
RCSTART

IDLE

IDLE

IDLE

JK

______~"

FC

DAD

------~rt
fCSL
,-- ~""'\:::I

DAI

DAl

DA3

DA4

DA5

SAO

SAl

SAl

SA3

SA4

SA5

INfOO

INfOl

: NOT

(~1\)

IDLE

'

JK

FC

r-L-

rJ

fCRCVD

oo

§,

()

::::!.

"

g. O·

iil

:::J
tn

'0
o
::J

g-

NEW VALUE

c::

CD

,e,
~~~""""'\:::I

UAIG

NEWVALUE

-

-.

---,---,

L...;
,

DARCVD

'"

'"

0>,

-.

,

I

AfLAG
-

VAUD
------,

---~--.

--!-!- + -

SARI::¥O

MfI..AG

VALID

SAMI;SA

VAUD

fOERftOR

~

__

~~

---,------,-

________ ____________________
~

-

-----.

._-

~r-l~

______

~~
TLlF/l0387-16

FIGURE 7-9. Format Error

7.0 Signal Descriptions (Continued)
LBC
M10

RCSTART

IDLE

IDLE

IDLE

IDLE

: JK

: fC

: DAD

:DAI

DA2

DA3

:DA4

::::::: IDLE

: JK

: fC

------~rl~~__----~--------rlL_
I

FCRCVO

--------~~r_'~I~------~--------~-r_l
I

FCSL

~ NEW~ALUE

OAIG

~~~

NEW VALUE
I

MACRST*

----------~~~~--~------~~~--------~~--

TLlF/10387-17

'MAC Rese1 can be asserted at any time. When MODEO.RUN

= 0 MACRST is asserted and remains asserted.
FIGURE 7·10. MAC Reset

PI

2·219

~

CD

~

~

Q

r-------------------------------------------------------------------------------------,
7.0 Signal Descriptions (Continued)
7.4 MAC REQUEST INTERFACE
The MAC Request Interface is used to gain access to the ring and to transmit data Into the ring. After a Request is submitted to
the interface, the Ring Engine awaits for an appropriate Service Opportunity in which to service the Request. Frames associated
with the Request are transmitted during an appropriate Service Opportunity. Sections 5.2 and 5.3 provide important information
related to the functional operation of the interface.
In the following sections, an overview (Section 7.4.1) and detailed signal description (Section 7.4.2) are provided. The detailed
description includes a signal by signal description followed by a state diagram that details the operation of the handshaking
signals. Finally several example timing scenarios are shown (Section 7.4.3).
7.4.1 Overview
The MAC Request Interface signals provide the Request and Frame level handshakes required to transmit frames.
The MAC Request Interface is divided into one group of data signals and four groups of control signals.
The data signals consist of the 8 bits of MAC Request data with optional parity.
The control signals consist of:
• Handshake signals that implement a Request level and Frame level handshake. The state machines that specify the
interface handshake are provided and described in detail in Section 7.4.3.
• Service Parameters that convey the requested type of Service Opportunity.
• Frame Options that convey the special transmission options. These are especially useful for MAC level bridging applications.
• Transmission Status that report the success and/or failure of the transmission.
7.4.2 Signals
Request Data
The MRD7 -0 signals change on the rising edge of the Local Byte Clock signal (provided by the Clock Distribution Device).
Symbol
MRP
MRD7 -0

Pin #

110

41

I

MAC Request Parity: Odd parity on MRD7 -0.

42-49

I

MAC Request Data: Data byte conveyed for transmission while the Transmit Acknowledge (TXACK)
signal Is asserted.

Description

2-220

7.0 Signal Descriptions (Continued)
Handshake
The Handshake signals control the Request Interface handshaking process. They are used for token capture and transmission
of PDUs.
Symbol

Pin ",

1/0

Description

TXPASS

28

0

Transmit Pass: Indicates the absence of a Service Opportunity. This could result from an unusable
request class, waiting for a token, timer expiration or MAC Reset. TXPASS is always asserted between
service opportunities. It is deasserted when TXRDY signal is asserted at the beginning of a Service
Opportunity.

TXRDY

29

0

Transmit Ready: Indicates that the Transmitter is ready for another frame. For a non-immediate
request, a usable token must be held in order to transmit frames. TXRDY is asserted when:
a) A usable token is being held or
b) An immediate request becomes serviceable or
c) After frame transmission if the current Service Opportunity is still usable for another frame.
It is deasserted when the TXPASS or TXACK signal is asserted.

RORDY

23

I

Request Ready: Indicates that the Transmitter should attempt to provide a Service Opportunity as
indicated by the RORCLS(3-0) signals one cycle before RORDY is asserted. The Service Opportunity
will be maintained as long as possible. If RORDY is asserted within 6 byte times after TXRDY signal is
asserted, the Transmitter will wait at least LMax plus one Void frame (4.16 /Ls or 4.80 /Ls) for
ROSEND to be asserted before releasing the token.

ROSEND

24

I

Request Send: Indicates that the Transmitter should send the next frame. The MRD(7 -0) signals
convey the FC byte when the ROSEND signal is asserted. If ROSEND is asserted within 6 byte times
after the TXRDY signal Is asserted, the Transmitter will send the frame with a minimum length
preamble. If ROSEND is not asserted within LMax plus one Void frame after RORDY signal has been
asserted (4.16 /Ls or 4.60 /Ls), the token may become unusable (due to a timer expiration).
For Immediate transmissions from the Claim or Beacon State (when ROCLM or ROBCN is asserted),
ROSEND must be asserted no later than 8 byte times after TXRDY is asserted.
ROSEND may only be asserted when TXRDY and RORDY signals are asserted and ROFINAL is
deasserted. ROSEND must be deasserted not later than one byte time after TXRDY is deasserted.

TXACK

30

0

Transmit Acknowledge: Indicates that the Transmitter is ready for the next data byte. TXACK is
asserted when the FC byte is accepted on MRD7 -0, and remains asserted for each additional data
byte accepted. It is deasserted one byte time after ROEOF ro ROABT is asserted. The signal is also
deasserted when TXABORT or TXPASS is asserted.

ROEOF

25

I

Request End of Frame: Indicates that MRD7-0 conveys the last data byte when asserted. Normally,
this is the last byte of the INFO field of the frame (exceptions: FCS transparency, invalid frame length).
ROEOF causes TXACK to be deasserted and is ignored if TXACK is not asserted.

ROABT

27

I

Request Abort: Indicates that the current frame should be aborted. Normally this causes the
Transmitter to generate a Void, Claim, or Beacon frame. ROABT causes TXACK to be deasserted and
is ignored when TXACK is not asserted.

ROFINAL

26

I

Request Final: Indicates that the final frame of the request has been presented to the MAC Interface.
When asserted, the Issue Token Class (as opposed to the Capture Token Class) becomes the new
Token Class (TXCLASS). ROFINAL may only be asserted when RORDY Is asserted and ROSEND is
deasserted. ROFINAL is ignored unless RORDY has been asserted for at least one byte time and the
service parameters have been valid for at least three byte times. ROFINAL must be deasserted not
later than two byte times after ROSEND is deasserted.

2-221

.,...
<0

C\I

CO)

7.0 Signal Descriptions (Continued)

a..

Service Parameters

co

C

The Service Parameters define the Service Request. They must be valid for at least one byte time before the RQRDY signal is
asserted and must not change while RDRDY remains asserted. See Section 5.3.1 for the encoding of RQRCLS.
The Requested Service corresponds to the Request Service Class and the Token Class parameters of the
(SM_)MLDATA.request and (SM_)MLToken.request primitives as specified in the Standard.
Encoded into each of the 14 possible values of RQRCLS in the Service Class (Non-Restricted Asynchronous, Restricted
Asynchronous, Synchronous, Immediate), the Token Capture and Issue Class, and THT Enable.
Requests are serviced on a Service Opportunity meeting the requested criteria.
External support is required to limit the requests presented to the MAC Interface by different MAC Users (SMT, LLC, etc.).
Symbol

Pin #

I/O

RQRCLS(3-0)

19-22

I

Description
Request Class: Indicates the Service Class parameters for this request (see Section 5.3.1).
When RQRCLS > 0, the Transmitter will capture a usable token (for non-immediate requests)
and assert TXRDY. The Service Opportunity continues as long as the token is usable with the
current service parameters, even if RQRDY is not asserted. If RQRCLS indicates a service class
that is not serviceable for any cycle of a service opportunity, the service opportunity will conclude
after the current frame and a token of the issue .token class will be issued.
If RQRCLS = 0, the Service Opportunity will terminate after the current frame and a token of the
issue token class will be issued (even if RQRCLS subsequently becomes non-zero). See
Table 5-3.

RQCLM

15

I

Request Claim: Indicates that this request is to be serviced in the Claim state. Ignored for nonimmediate requests.

RQBCN

16

I

Request Beacon: Indicates that this request is to be serviced in the Beacon state. Ignored for
non-immediate requests.

Frame Options
The Frame Options signals are selected for each frame. They must be valid while the RQSEND signal is asserted. These
options are typically used in bridging applications.
Pin #

I/O

STRIP

13

I

Void Strip: Forces two My_Void frames to be transmitted on end of current Service Opportunity.
Stripping continues until a My_Void frame returns. If any frame of a Service Opportunity requests this
option, then all frames on that Service Opportunity will be stripped using this method.

SAT

12

I

Source Address Transparency: When SA transparency is selected, the SA from the data stream is
transmitted in place of the internal MSA or MLA stored in the MAC Parameter RAM.

SAIGT

11

I

Source Address I/G Transparency: With this option, the MSB of the SA is sourced from the data
stream, as opposed to being forced to zero.

FCST

14

I

Frame Check Sequence Transparency: When selected, the Ring Engine generated FCS is not,
appended to the end of the Information field.

Symbol

Description

2-222

C

"tJ

7.0 Signal Descriptions (Continued)

01)

W
N

Transmission Status

Q)
.....

Pin #

1/0

Description

TXED

31

0

Transmitted Ending Delimiter: Indicates that the Transmitter completed transmission of the current
or previous PDU. TXED is asserted when the current PHY Request byte is a transmitted (not
repeated) Ending Delimiter. It remains asserted until the beginning of either the next transmitted (not
repeated) PDU or the next Service Opportunity. TXED is cleared by the Master Reset (bit MARST of
the Function Register).

TXABORT

32

0

Transmission Aborted: Indicates that the Transmitter aborted transmission of the current or
previous PDU before the Ending Delimiter, or that the current Service Opportunity was aborted by
Reset or Recovery actions. TXABORT is asserted when the current transmitted (not repeated) PDU
has been aborted, and remains valid until the beginning of either the next transmitted (not repeated)
PDU or the next Service Opportunity.

Symbol

TXABORT is cleared by Master Reset (bit MARST of the Function Register). It is also cleared when
an Immediate Claim or Beacon Service Opportunity is terminated by My_Claim or My_Beacon
received (I.e., when transition T(47) or T(54) occurs during an Immediate Service Opportunity).
TXRINGOP

37

0

Ring Operational: Indicates the current value of the Ring_Operational flag.

TXCLASS

35

0

Token Class: Indicates the class of the current or previous token in the Transmitter. TXCLASS is set
to FL-Flag when a valid token is received. TXCLASS is set to the Issue Token Class when the
RORDYand ROFINAL signals are asserted (before Token FC time) for the current Service
Opportunity. It is cleared by Reset and Recovery actions.

THTDIS

36

0

Token Holding Timer Disabled: Indicates that the Token Holding Timer was disabled when the
current PHY Request byte was generated. THTDIS only changes between frames. When either signal
TXRDY or TXPASS is asserted after a frame, THTDIS reflects the THT usage for that frame for at
least two byte times. When TXPASS is asserted while THTDIS is asserted it indicates that TRT
expired.

2-223

.....
CD
C'I

('I)

CD

a.
C

7.0 Signal Descriptions (Continued)
7.4.3 Operation
The MAC Request Interface has three logical states as determined by TXRDY and TXPASS. The interface state machine is
shown in Figure 1·11 followed by a description of the conditions. states and transitions.
State

Description

TXRDY

MRO: Not Ready

Ring Engine is not ready to service a request

0

1

MR1: Ready

Ring Engine is ready to transmit a frame

1

0

MR2: Sending

Ring Engine is sending a frame

0

0

MRO: NOT READY
f.lR(01)

MR1:READY

MR2: SENDING

SERVICE OPPORTUNITY
f.lR(12)

SET TXRDY. CLEAR TXPASS

END OF SERVICE OPPORTUNITY
SET TXPASS. CLEAR TXRDY

SEND FRAf.lE
CLEAR TXRDY. TXPASS

FRAf.lE SENT It
CONTINUE SERVICE OPPORTUNITY
MR(10)

TXPASS

SET TXRDY. CLEAR TXPASS

END OF SERVICE OPPORTUNITY
SET TXPASS. CLEAR TXRDY

f.lR(21)

f.lR(20)
TL/F/10387-18

FIGURE 7-11. MAC Request Interface State Machine
Conditions
Send Frame

A frame can be sent from the interface when at least 8 bytes of preamble have been transmit·
ted. TXRDY. RQRDY and RQSEND are asserted. and RQFINAL has not yet been asserted for
this request.

Service Opportunity

A Service Opportunity occurs when it is possible to service the current request. as defined by
the current service parameters (RQRCLS. RQCLM and RQBCN). The rules for servicing reo
quests are described in Section 5.2.

Continue Service Opportunity

A Service Opportunity is continued after the current frame if valid service parameters continue
to be presented during the frame. and the timer(s) used for the (next) requested service class
have not reached their threshold.

End of Service Opportunity

The end of a Service Opportunity occurs when it is no longer necessary or possible to continue
the Service Opportunity. The service parameters are continuously compared with the current
state of the Transmitter. If an unserviceable request is presented or any timer threshold is
reached. the Service Opportunity will not continue after the current frame (if any).

Table 7·4 shows the timer thresholds used to determine if a Service Opportunity is possible for each service class.
TABLE 7·4. Thresholds Used to Determine Service Opportunities
Request Service Class

Threshold

All Requests

TRT Expiration

All Requests with THT Enabled

THT Expiration

Priority Asynchronous Requests

Asynchronous Priority Threshold

2·224

7.0 Signal Descriptions (Continued)
State Descriptions

The send window is held open until

MRO: Not Ready

1) ROSEND or ROFINAL is asserted or

In this state the Ring Engine does not have a Service Opportunity. If RQRCLS is not zero, the Ring Engine is trying to
secure a Service Opportunity meeting the requested service
parameters.

2) until LMax has expired (3.20 ,""s), a Void frame has
been sent (0.96 '""S or 1.60 ,""s), and 7 more bytes of
preamble have been sent (0.56 ,""s). (When
Op1ion.IRPT = 1 this condition does not apply.)

On a valid Service Opportunity, the MR(01) transition is taken. The status signals TXED and TXABORT are cleared and
TXRDY is set to indicate that the Transmitter is ready to
service a request.

At any time after RORDY has been asserted and the final
frame of the request has been sent, ROFINAL may be asserted to indicate that a token of the Issue Token Class
should be transmitted at the end of the current Service Opportunity. If the MR(10) transition occurs while ROFINAL is
asserted, and all the other conditions for accepting ROFINAL hold, the transmitted token will be of the Issue Token
Class.

MR1: Ready
In this state the Ring Engine has secured a Service Opportunity and is ready to service the current request. The Transmitter is sourcing Preamble, Fill or internally generated Void
(from the Data state), Claim (from the Claim state) or Beacon (from the Beacon state) frames.

After ROFINAL has been asserted, no more frames can be
sent until RORDY has been deasserted and then reasserted. RORDY should be deasserted and the service parameters updated to reflect the next request (if any) as soon as
pOSSible, to allow the Ring Engine to make better ring
scheduling decisions. If RORDY is not deasserted by the
end of the last frame of a Service Opportunity, a Void frame
will be transmitted before the token.

The Service Opportunity is governed by the requested service parameters. If an unserviceable request is presented for
one or more cycles the Service Opportunity ends. If THT
expires or a priority threshold is reached, the Service Opportunity will end immediately or after the next frame, depending on the state of the send window.

When the Service Opportunity ends, the MR(10) transition is
taken and TXPASS is asserted to indicate the end of the
current Service Opportunity. ROFINAL (and RORDY) must
be asserted not later than one byte time after TXPASS to
insure that a token of the appropriate issue class is issued.

The send window is an opportunity to send a frame without
being interrupted by time thresholds. The Service Opportunity may end during a send window if the service parameters change.
The send window opens each time TXRDY is asserted (entry to MR1). It remains open for a minimum of 6 byte times.
The send window also opens if RORDY is asserted while
TXRDY is asserted, and if TXPASS is not asserted within
one byte time after RORDY is asserted.

When a frame can be sent from the interface, the MR(12)
transition is taken and TXACK is set to indicate that the
Transmitter is sending the frame.
The state diagram for the internal substates within state
MR1 is shown in Figure 7-12.

MRRO:PREAMBLE

MRR1: FILL

AFTER 8 BYTES & RQRDY & RQSEND &
(lRPT I... TXABORT)
RQRDY & RQSEND
MR( 12) --C-LEA=-R-TX-=--ED-;-SET-T-'XA'--C-K--<.( MR2 l---C-LEA-R'--T-X-ED-;-SET'----TX-A-CK-- MR( 12)
AFTER 8 BYTES & T2 & ... RQSEND & (IRPT 1(RQRDY & ... TXABORT»
MRR(01) - - - - - - - - - - - - - ' - - - - ' - ' - - - - - - - ' - ' - - - - - 1

MRR2: SOURCE_FR
ELSE AFTER 8 BYTES

MRR(02) - - - - - - - - - - 1
AFTER ED

1---------SET TXED; CLEAR TXABORT

ELSE ... IRPT &
(AFTER 32 BYTES I... RQRDY)

1---'-----'--'----:.......-

MRR(12)

MRR(20)

r::::::\

MR(10)

END OF SERVICE OPPORTUNITY
END OF SERVICE OPPORTUNITY
SET TXPASS
• ~.
SET TXPASS

MR(10)
TLlF/l0387-19

FIGURE 7-12_ MR1 Substate Diagram

2-225

~

re

CO)

f
Q

r------------------------------------------------------------------------------------------,
7.0 Signal Descriptions (Continued)
On entry to MR2 TXACK is asserted. It remains asserted
while data is being accepted from the interface. ROSEND
must be deasserted within one byte time after entering
MR2.

SUBSTATE MRRO: Preamble
Upon entry to MR1, 8 bytes of Preamble (Idles) are transmitted in substate MRRO.
After the Preamble, if a frame can be sent from the interface, transition MR12 occurs. The frame options are
latched, TXED is cleared and TXACK is asserted.

At any time after ROSEND is deasserted for the final frame
of a request, ROFINAL may be asserted to indicate that a
token of the Issue Token Class should be transmitted at the
end of the current Service Opportunity. If the MR(20) transition occurs while ROFINAL is asserted, and all the other
conditions for accepting ROFINAL hold, the transmitted token will be the issue token class.

If a frame cannot be sent from the interface, either Fill (additionalldles) or an Internally generated frame (Void, Claim, or
Beacon) is transmitted.
SUBSTATE MRR1: Fill
For requests, if RORDY is asserted (indicating that the current request has been selected for service) or Option.IRPT
is set (indicating that the ring is being interrupted), additional
fill bytes (Idles) are transmitted in substate MRR1.

After ROFINAL has been asserted, no more frames can be
sent until RORDY has been deasserted and then reasserted. RORDY should be deasserted and the service parameters updated to reflect the next requests (if any) as soon as
pOSSible, to allow the Ring Engine to make better ring
scheduling decisions.

Fill continues until:
1) a frame can be sent from the interface, or

The last byte of data at the interface is indicated by ROEOF,
which must be asserted with the last byte of data. After the
Ending Delimiter of a frame is transmitted, TXED is asserted. When not using FCS transparency, TXED is asserted 7
byte times after ROEOF is asserted. When using FCS transparency, it is asserted 3 byte times after ROEOF is asserted. TXACK is deasserted no later than one byte time after
ROEOF is asserted.

2) the Service Opportunity ends, or
3) 32 bytes of Idles are transmitted or RORDY is deasserted. After that, an internal Void frame is generated
in substate MRR2. (If Option.IRPT is set Void frames
are not generated.)
If RORDY is not asserted, if ROCLM or ROBCN is asserted,
or (unless Option.IRPT is set) if the previous frame in the
current Service Opportunity was aborted, an internal Void,
Claim or Beacon frame is generated in substate MRR2.

At any time during frame transmission, TXABORT may be
asserted. This indicates that the frame was aborted due to
internal errors, buffering errors, parity errors, ROABT, MAC
reset, reception of a MAC frame etc. TXACK is deasserted
no later than TXABORT is asserted. When a transmission is
aborted due to an error (and Option.IRPT is not set), a Void
frame is transmitted to reset the TVX timers in all stations in
the ring.

At the end of an internal frame, TXED is set, TXABORT is
cleared and another preamble is generated in substate
MRRO.
MR2: Sending
In this state the Ring Engine is transmitting a frame from the
MAC Request Interface. While the frame is being sent, if an
unserviceable request is presented or any timer threshold is
reached, the Service Opportunity will end after the current
frame.

After a successful or unsuccessful frame transmission, if the
current Service Opportunity can be continued transition
MR(21) occurs and TXRDY is asserted; otherwise transition
MR(20) occurs and TXPASS is asserted.

This implies that a Service Opportunity is never longer than
TMAX plus one maximum length frame interval for Immediate Requests (unless Option.IRPT is set), or TNEG plus one
maximum length frame interval for Non-immediate Requests. The maximum length of the frame interval is the
maximum send window open time (4.64 ,,"s-5.28 ,,"s) plus
F_max. F_max is the maximum length of a frame, including 2 bytes of Preamble. The default value of F_max for
FOOl is 4500 bytes = 360.00 ,,"s.

If at any time during a frame transmission, the end of Service Opportunity condition is detected, transition MR(20) will
occur after the current frame transition.

2-226

.----------------------------------------------------------------------.0
"'CI
7.0 Signal Descriptions (Continued)

CC)

an over-allocation of synchronous bandwidth or a station
used more than it was allocated. The ring will likely be claiming when this occurs.

7.4.3.3 Transmission Status
Upon leaving MR2, transmission status is available after
TXRDY or TXPASS is asserted. TXED and TXABORT are
normally valid for at least 9 byte times (exception: 2 byte
times when an Immediate Service Opportunity ends without
issuing a token, and another Service Opportunity begins immediately upon return to state MRO). THTDIS is valid for at
least 2 byte times. When TXPASS is deasserted and for at
least two byte times after is reasserted, TXCLASS denotes
the token that will be issued at the end of the current Service Opportunity.

7.4.4 Timing Examples
Several example sequences of the MAC Request Interface
are provided. While this in no way is an exhaustive list of
sequences, several likely sequences are shown. It is useful
to follow the state diagrams of Section 7.4.3 (Figures 7-11
and 7-12) while examining the scenarios.
The timing is shown for all signals available at the MAC
Interface.
The data shown in MRD and PRD are the data at those
interfaces.

TXED indicates that the Ending Delimiter of the previous
PDU was transmitted. TXABORT indicates that the previous
frame was aborted as a result of a request abort (RQABT),
an internal error or the Reset or Recovery Required condi·
tions became true.

The data at PRD is duplicated with the TXED to show its
relationship with the transmitted Ending Delimiter.
TXPASS and TXRDY show the relationship to the data at
the transmitter. This is one byte time before the data is
transmitted. The relationship to incoming tokens is shown
explicitly.
RQRCLS contains the Requested service class. In several
examples this is shown as generic requests (rt, r2) to make
the examples more general purpose. The RQCLM and
RQBCN signals are not shown, but have the same timing as
the RQRCLS signals.
The Frame Options are grouped together since they have
the same timing. These include the SAT, SAIGT, FCST and
STRIP options.

If TXED is asserted, TXABORT may also be asserted (within
9 byte clocks) if this station backed off to another station
after a complete Claim frame was transmitted.
When transmitting Claim/Beacon frames from the Transmitter Claim or Beacon, if TXPASS is asserted the Claim or
Beacon Process has completed. In this case, TXABORT
indicates if this station won (TXABORT = 0) or lost
(TXABORT = t) the Claim or Beacon process.
The interpretation of TXED and TXABORT is given in Table

7-5.

TXED

TABLE 7-5. Transmission Status
TXABORT
Condition

0

0

Single Frame Transmission with Prestaglng
Prestaging refers to the staging of data before the Service
Opportunity begins. Prestaging occurs in interfaces where
data is loaded into a FIFO or dedicated memory used as a
FI FO before the token arrives.
In Figure 7-13 RQRDY is asserted one byte time after
RQRCLS has been passed to the interface. At this pOint the
Ring Engine is awaiting an appropriate Service Opportunity.
Upon capture of a usable token, TXRDY is asserted.
TXRDY causes RQSEND to be asserted.
RQSEND causes TXRDY to be deasserted, which in turn
causes RQSEND to be deasserted.

After a Master Reset or frame
aborted during successful
immediate Claim or Beacon
service due to My_Claim or
My_Beacon.

t

0

Complete frame transmitted.

0

t

Frame aborted.

t

t

Complete frame transmitted,
followed by reset or recovery
actions or unsuccessful immediate
Claim or Beacon service due to
timeout.

Notice that after RQSEND is deasserted, RQFINAL is asserted for one cycle to indicate that the issue token class
should be used for the token. RQRDY is then deasserted
and RQRCLS is set to zero. Since RQRCLS goes to zero,
the end of Service Opportunity condition becomes true and
the token is issued at the end of the current frame.

If TXPASS is asserted and THT was disabled during the last
frame that was transmitted (THTDIS is asserted), TRT has
expired. This is a serious error and indicates that there was

2-227

W
N

...c»

DP83261

.....

o

en

TXRINGOP

~i
jk

TXPASS
RORCLS :

re ulL 1_____________________________

::::J r1

1

n

____________---1 rr

::J

!.

nUjkfcU

ii

cCD

11

en

.,
()

ROROY
THTDIS
TXRDY
FR OPTIONS

-

.~:

-6'
0'
::J
en

1r1
~1-·-

i

__,_-:-....,........,....-..,....-,.....--------.J.1

::s
c

1,..........,-,...--:--:-...,....-_

CD

valid ...

So

ROSENO

1\)'

MRD

i\:,

_ _ _ _ _ _ _--,- 11

:,

11 111 i21 i3114IiSfi6fl7fi8 : f1YJizlr....,--:---:-_--:---:---..,..._,_...,....----------

I\)


ROFINAI.

.

.

.

:~~~--------~-----i1

11

n

UUnjkfcU

n

--,---,---,-.--,-.--,-.--,-.--,-.--,-.--,-.--,---,---,---,-~
. . ~.--,-.--,-.~

TXCLASS
PRO

_ _ _ _ _...;.._u...;...;.n...;.......;;,.U I jk

11 i2 i3

S

A

i6

~

~

~

~

n a a

M ~ ITlii

fi

fi

fi
TUF/l03B7-20

FIGURE 7·13. Asynchronous Request with Prestaglng

7.0 Signal Descriptions (Continued)
If RORCLS remained asserted the token would be held as
long as possible and multiple frames could be transmitted.
In this case the t TXRDY t ROSEND - J- TXRDY
- J- ROSE NO handshake for the beginning of each
frame remains identical.

In Figure 7-16 the MAC Reset occurs while the Ending Delimiter is being transmitted. In Figure 7-17the boundary case
is shown where the MAC Reset occurs during the Frame
Status. Note that the Ending Delimiter of the frame is transmitted with the frame status. TXRDY is asserted for one
cycle followed by TXPASS with TXABORT.

Single Frame Transmission without Prestaglng
In Figure 7-14, prestaging is not used. Multiple requests are
present at the interface, of which only the highest priority
request is presented to the interface. RORCLS is changing
because higher priority requests become ready to be serviced. The scheduling decision is made until a Service Opportunity occurs. Once TXRDY is asserted, RORDY is asserted and the rS request is serviced.

Synchronous Request followed by Asynchronous
Request
In Figure 7-18, frames from two requests are serviced on
the same Service Opportunity. Once the synchronous frame
is being transmitted, the RORCLS is changed to that for the
asynchronous frame. At the end of the synchronous frame
TXRDY is asserted since the token is still usable for the
asynchronous request. RORDY is then asserted and the
Asynchronous frame is then transmitted.
Notice that the value of THTDIS changes after the Frame
Status for the synchronous frame is transmitted. THT is disabled for synchronous transmission and enabled for normal
asynchronous transmission.

When the data associated with rS is ready to be transmitted,
ROSEND is asserted. This in turn causes TXRDY to be
deasserted when transmission begins (entrance to MR2).
The deassertion of TXRDY causes ROSEND to be deasserted.
During the first frame of the request, the end of Service
Opportunity condition becomes true as a result of:
THT reaching the THT priority threshold if the request
was an asynchronous priority request,
THT expiration if the request was an asynchronous request or
TRT expiration if the request was a synchronous request.
TXPASS is asserted to indicate that this Service Opportunity
is complete.

Restricted Begin
In Figure 7-19, a restricted dialogue is begun. A non-restricted Token is captured, a single frame is transmitted and a
Restricted Token is issued.
An Rbeg Request is a request to capture a Non-restricted
Token and issue a Restricted Token. Since there is only one
frame in this example, ROFINAL is asserted during the first
frame. In the example, ROFINAL is asserted one byte time
after ROSEND is deasserted while RORDY is still asserted,
but it may be asserted anytime while RORDY is asserted.
Notice that TXCLASS changes to restricted after ROFINAL
is asserted.

If RORCLS remains greater than 0, the next usable token
will be captured and servicing of the request will continue. If
RORCLS remained asserted the token would be held as
long as possible and multiple frames could be transmitted.
In
this
case
the
t TXRDY - t ROSEND J- TXRDY - J- ROSEND handshake for the beginning of
each frame remains identical.

Immediate Claim
In Figure 7-20, an immediate Claim frame is transmitted
from the Claim state.
A Lower_Claim frame is received from an upstream station,
causing this station to enter its Claim state and deassert
TXRINGOP.RORCLS is set to immediate and ROCLM is asserted.

Aborted Frame Transmission
A transmission as in Figure 7-14 is started. During the transmission, an interface error occurs (for example) and ROABT
is asserted to cause the current frame to be aborted (see
Rgure 7-15). TXACK is then deasserted and TXABORT is
asserted to indicate that the frame was aborted as a result
of a FIFO underrun or an equivalent reason. This is signaled
with ROABT. After the frame is aborted, TXRDY is asserted
to indicate that another frame may be transmitted. Since no
frames are ready to be transmitted a Void fill frame is transmitted. During the Void frame transmission, the interface
then sets RORCLS to zero to indicate that the Token should
be issued. TXPASS is then asserted once the Ending Delimiter of the Void frame is transmitted.
In this scenario the transmitted Void frame serves two purposes. It is transmitted because the interface was stalling
waiting for another frame and also in response to the aborted frame. A Void frame is transmitted every time a transmission is aborted.

An internally generated Claim frame is first transmitted (at
least one internally generated Claim or Beacon frame is always transmitted upon entry to the Claim or Beacon state).
After the internally generated Claim frame is transmitted,
TXRDY is asserted since the transmitter is still in the Claim
state (the ring can hold more than one Claim frame). The
frame is then transmitted following the normal handshake.
Similar timing applies for externally generated Beacon
frames.
Remember that for Immediate Requests from the Claim and
Beacon States, ROSE NO must be asserted no later than
B byte times after TXRDY is asserted. This guarantees that
a minimum size preamble will be generated.
After the frame is transmitted, TXRDY is asserted again
since the transmitter is still in the Claim state.

MAC Reset

If this station wins the Claim Process TXPASS is asserted
without TXABORT. If another station causes this station to
backoff (this station receives a Higher_Claim), TXPASS is
asserted with TXABORT.

In Figure 7-16, a MAC reset occurs during a frame transmission. This causes the current frame to be aborted and the
Ring Operational Flag (TXRINGOP) to be deasserted.
TXPASS is asserted with TXABORT after the frame is aborted. Since the ring is not operational, no Void frames are
transmitted.

2-229

DP83261
......

b

TXRINGOP

en

~r6

TXPASS

nCRDY

'"'"

0,

II

Jk fe It

::l

!!.

cCD
tn

...n
.:s'

-

iiI r6

TX1HTDIS

1\)'

II

-r6

RQRDY

RQSEND

~...,..-..,..-~....,.....,.~I rr

II

rl I r21 r31 r41 rsl r6

RQRCLS : _

FR OPlIONS

(6'
II

0'
::l

tn

gs

Jk fe tt I r41 rsl r6

,

.

.

.

.

~

~

. vand ....
1:'""....,..-..,..---,._ _
.

.

.

. . .

.

,.

E

....

~

:~I

------~~.~
. . . . . . ~.~.~~~.~.~.~.~.~.~.~.~~~~~~~~

t.4RD

11

11

11 Ji2lI31i4PSfI6

ri71 18 : IIy liZ 1.....--,.__..,....---,.....,...-..,.....--,.-....,...----,.-

:1

D:ACK

~.~.~.~.~.~.~.~~~.~.~.~.~.~.~

RCIABT
TXABORT

~~~~~~~~:~~~-:-~~-:-~~~~~~~~....,...

RCiEOF
lXED

_____~...L..-,......,......':'"": ~

Itr rr Ii

II

iI

II

II

iI

II

Jk feltt

RQFINAL
TXCLASS
PRO

"

"

II

II fiklL.;.1....;;:......;;;....,;,;.....:;...

____"....1jk

11

i2 i3 S Ii. i6

I

-ii _---'
iw Ix Iy Iz f1 f2 f3 f4 tr rr .._iI_ _ _ _ _
TLlF/10387-21

FIGURE 7-14. Asynchronous Request without Prestaging

......
(:)
TXRINGOP

TXPASS

~Ii

RORCLS

L.C

jk

en
cO'
j
e!.

Ie tt

cCD

en
(')

~,

RORDY

"0

0'
j
en

-----, r

TXTHTOIS

~

TXRDY

Ii

I

oo
:::J

5'
c

FR OPTIONS

'"

S
ROSEND

~I

MRD

fi6Ti7l

i8

! iI --:--:---:---:---:-......,..---:-......,..---:---:---:---:-,..-,---:---:---:---:---:-~
L..:,!

TXACK

.~~~~~~~~~~~~~~

ROABT

.~~~~~~~~~~~~~~ ~~~
-:-~---:i1-'1 ii

TXABORT

Ii

Ii

Ii

jk 0

0

0

SAl

12 13 14

LI_ _ _ _ _ _ __

RQEOF

________~~~~--~~~~~~~~~~~---'!tr rr

TXED

jk Ie

IIt

RQFINAL

TXCLASS

PRD

S

A

6

ij

ik

iI

I ii

iI

iI

I jk

0

0

0

SAl

12 13 14 tr

rr L'...;......;...,.;...___,.;...

~

TL/F/l0387-22

FIGURE 7,15. Frame Abort

~9~C9da

II

~

CI)

f
Q

.---------------------------------------------------~---------------------,

7.0 Signal Descriptions (Continued)

:~:-:--:-~
~~~~~~~:~:

TXRINGOP

RQRDY

~lr6

TXTHIDIS
TXRDY
FR OPTIONS
RQSEND
MRD

~~~~~~":"'"""~~_ : ~

1
..._ _ _-.,._...,...

valid

""":"'""":---:--:--:~~~-:- :.-J
~"":"'"""~~...,..."":"'"""~~: ~ 1"

1111211311~11~11~1~11~

: 1 ;11 ...,......,...

lk 11 12 13 14 15 16 17

:"ik"iil-:
..
. --:---,-

11

-_.....I

TXACK

~

RQAST
TXABORT
RQEOF
TXED
RQFINAL
TXCLASS

....
PRD

nllnll[jkJIIIRIlIl

II

n n nllk 11 1213 SA 16

:~:

_ _ __
TL/F110387-23

FIGURE 7·16. MAC Reset

2·232

r----------------------------------------------------------------------, C

;g

7.0 Signal Descriptions (Continued)

~

a)

-:--:--:-~~-:--:--:-,I

TXPASS
RQRCLS

....

L

TXRINGOP

:oJ ;q r~. .r~ .r~ .r~ .
I

TXTHTOIS

I

I

I r6

r51 r6

TXROY

FR OPTIONS
RQSENO

-:--:--:--:--:--:--:--:--:-~ ::oJ
-:--:--:--:--:--:--:--:--:-~

:

.alld

& . . 1: - - : - - : - - : - - : - - : - - : -

.J
II

iI

II

-:--:--:-,1 jk

11211~ II~ II~ II~ II~ 118

:

II~ I I~ I,-:-,,":-,,-:--:--:--:,,--:--:-~

12 13 14 15 16 17

:

~,-':--:--:--:--:--:--:--:--:-

II

~-:--:--:--:--:--:---:-,I tr
RQFINAL

PRO

rr

ii

~-:--:--:--:--:--:--:--:--:-

Ii

ii

i~ HklL.I_;__1_1_ii_li_

Iw Ix Iy Iz

11 12 13 14 Ir rr

I!..

TL/F/l0387-24

FIGURE 7·17. MAC Reset at End of Frame

2·233

DP83261

.....

b

en

~.

::l

e!-

lXRINGOP
lXPASS

---:~~,~~~~~~~~

ROReLS

:J~:

THlDIS

lXRDY
FR OPTIONS

· ..

---

~

""'"
"'"

MRO

L!!..!J"nll
...,....,....,.....,.....,.....,.....,....,_y"J.. va.1Id ~ ...C,.....,......,.....,.....,....,....,...

· ..

~.~.~.~.~.~.~.~.~
. . . ~.~.~~~

--· ..

r--'"""l

..,......,....,.....,.....,.....,....,.....,.....,...11 11

11~5lf6T17P8

lXACK
·

ROAST
TXABORT
RQEOr
lXED
ROnNAL
lXCLASS
PRO

"tJ

----.""'.-.,.....,....,-.,..

.... . r

I o"n I

..

. "",.I....,.....,.....,.....,......,.....,.....,....,..
valid

~~~~~~...,....,...I.

.

o:

CD

.l~.~~~

fiYTiZl:--.-.-.-.--.-.-.---.-.-.• " " i i ,ipifl3fUPsp 1 pa Ilyll%..,I,....,......,.....,....,.....,.....,.....,....,..
-"--l
-'
-"--l...,......,.....,....,.....,....,.....,....~
6 17

~...,......,......,.....,...~,.....,.,...I'r

-=___ ·:::::J
n n n

:..!ffl

8

~

8

n n n

~

Ilk 11

8

8 8-n-8-8ol...,..
. ...,......,.....,-..,....,....,.....,,..

. ................. :n~:~~

n

· ..

.~~:....,......,~~....,....~

rr

12 i3 S

A 16

iw Ix Iy Iz f1 f2 f3 14 Ir

rrl R

i

n

8

n n

8

Ilk 11

12 13 S A i6

~~~~~~~.~

tw Ix I)' iz f1 f2 f3

,.e.

tr

rrl.!...

TlIF/l0387-25

FIGURE 7-18. Synchronous Request followed by Asynchronous

l'
.s

· ..

-::· ___
•:::::J
......

en
g-

I...,......,.....,-,-....,......,,.....,..

....,....~~....,....~....,......,~~....,.....,-,-....,....,.....,...~:

o::l·
::l

-::___ ::::::J
· ..

~.

I I

luyn

..

·

ROSENO

I ~"n
I I ";Yn

,""""",....;.....,.....,.....,.....,...1 ~yn
).yn

RQRDY

O

CD

en
~~~~~~~.~ ()

.....
b

en

TXRINGOP

I rbeg

TXPASS
RQRCLS
RQRDY

.:=J

-:-_:___:__~~___:_~I rr

cO"
:::s
!!.

Jk Ie It

C

I I

rbeg

I rbeg

.

---:--:----:....-~:-:~

~=====-----------~~t=============-.

I
I rbeg

THTDIS
TXRDY

Jk Ie It I ii

II I"

II

Ii

iI

II

...
CD

(I)
()

-S"
0"

ii L.I,.........,_ _---,-.....,...._ _

:::s
(I)

'§
:::I

g.

-:--:--:--:--:--:--:--:--:-~I

FR OPTIONS

valid

MRD

-:--.,........,.........,......,.........,......,.........,.........,.---,..- 11

N

""

CD

B

-~I----:----:~...,....

RQSEND

1\)1

C

-L.I,....-,....-,....-,....-,....-,....-,....

11 11 1 i21 i31141151161 i7118

U1

:

riy 1 iz ~I-:---:---:---:----:--:--:--:--:----:--:-:---:--.,........,..---:--:--,........,....

:~~~~~~~-,....--,....--,....-~-:--,..-

TXACK
RQABT
TXABORT

-----~~-------------------------:~~-:--.....,....~---:-.....,....-,....-:---:--~~---:-.....,....---:---:--~,....

RQEOF

_ _ _ _ _ _ _....JI tr

TXED

rr

II

II jk Ie It

II

II 1 Jk Ie It

-,....--:--:--:--:--:--:--:--:--:--:-~n~-:--:-_ __

RQFINAL
TXCLASS

.
PRD

_ _ _"_"_ :

~ II

rotr token

II

II

Ii I jk i1 12 13

S A

6

Iw ix

iy iz 11 12 13 14 tr rr III

II

~

TLlF/l0387-26

FIGURE 7-19" Restricted Begin

~9~&8da

II

DP83261

.....

b
tn
iff
::J

!.
llCRINGOP

oCD

:~

llCPASS

-----

RORClS :

::1-.-: :

(IJ

...n

...........

RORIJY

. ...... r:_~Io~I~

-----

lower

claim

..........................................

I»
I\)
Co>
C»

MRD

lXABDRT

-------------

. . . . . . .

III'

rr

Inn

11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 111~1i31~1~1~[I7I~II9-

. . . ..

-------------

liil~

..r:,... ..,....,....,......,....,.-,....,....,....,....,...

...,.....,....,.-,.....,.-.,......,....,....,....,...

~L,.:

........................................ :~L,.:-.,....,....,.....,.....,.-.,....,....,....,....,..
. . . . . . . . . . . . . . . . . . . . . . . . . lirrr----g ••

1XED

::J

.............................................

RQEOF

RQFIIIAL

(IJ

g
a

Bunlal

...... .

. . . . . ..

11 12 13

'" Ix IJ Iz II f2 13 14

III'

rr

B • U

-----

lXClASS
PRD

~: i..i.fii;l~

n

D

Illk

10

A

A cO.l c2 c3 II f2 13 14

II' rrll

.Ilk

A 115 17

II' rrl.!...!...!..
TUF/l0387-27

FIGURE 7-20. Immediate Claim

c:

!

lXACK
RQABT

::J

..Del

FR OPlIOHS
RQS£ND

..... .

I.

1IIIIIIS

1XRDY

-

ii'
0'

111!III1Od1a1o .lalm

C

7.0 Signal Descriptions (Continued)

."

7.5 ELECTRICAL INTERFACE

....

co
~
en

The Electrical Interface signals comprise all of the clocking, power supply, and ground pins.
Pin #

1/0

LSC

87

I

Local Symbol Clock: 25 MHz clock with a 40/60 duty·cycle. Typically generated by the COD.

LBC

86

I

Local Byte Clock: 12.5 MHz clock 50/50 duty·cycle in phase with LSC. Typically generated by the
COD.

RST

118

I

Master Reset: Equivalent to setting the Master Reset bit in the Function Register. An asynchronous
input that must be asserted for at least 5 LSC clock cycles. When asserted, all bi·directional signals
are tri·stated. Active low signal.

Vee[ll]

4,17,34
58, 78
94, 100
106,117

I

Positive Power Supply: 5V, ± 5% relative to GND.

GND[11]

5,18,33
57,77,
88-91,
101,
116,128

I

Power Supply Return

Symbol

Description

7.6 PINOUT SUMMARY
TABLE 7·6. Pinout Summary
Pin #

Signal Name

Symbol

110

1

Control Bus Data 1

CBD1

I/O

2

Control Bus Data 2

CBD2

1/0

3

Control Bus Data 3

CBD3

1/0

4

Positive Power Supply

Vee

I

5

Ground

GND

I

6

Control Bus Data 4

CBD4

1/0

7

Control Bus Data 5

CBD5

1/0

8

Control Bus Data 6

CBD6

1/0

9

Control Bus Data 7

CBD7

I/O

10

Control Bus Parity

CBP

I/O

11

Source Address I/G Transparency

SAIGT

I

12

Source Address Transparency

SAT

I

13

Void Strip

STRIP

I

14

Frame Check Sequence Transparency

FCST

I

15

Request Claim

ROCLM

I

16

Request Beacon

ROBCN

I

17

Positive Power Supply

Vee

I

18

Ground

GND

I

19

Request Class 3

RORCLS3

I

2·237

7.0 Signal Descriptions (Continued)
7.6 PINOUT SUMMARY (Continued)
TABLE 7·6. Pinout Summary (Continued)
Symbol

I/O

20

Request Class 2

RORCLS2

I

21

Request Class 1

RORCLS1

I

22

Request Class 0

RORCLSO

I

23

Request Ready

RORDY

I

24

Request Send

ROSEND

I

25

Request End of Frame

ROEOF

I

26

Request Final

ROFINAL

I

27

Request Abort

ROAST

I

28

Transmit Pass

TXPASS

0

29

Transmit Ready

TXRDY

0

30

Transmit Acknowledge

TXACK

0

31

Transmit Ending Delimiter

TXED

0

32

Transmit Abort

TXASORT

0

33

Ground

GND

I

34

Positive Power Supply

Vee

I

35

Token Class

TXCLASS

0

36

Token Holding Timer Disabled

THTDIS

0

37

Ring Operational

TXRINGOP

0

38

External A-Flag

EA

I

39

External M_Flag

EM

I

40

Positive Power Supply

Vee

I

41

MAC Request Parity

MRP

I

42

MAC Request Data 7

MRD7

I

43

MAC, Request Data 6

MRD6

I

44

MAC Request Data 5

MRD5

I

45

MAC Request Data 4

MRD4

I

46

MAC Request Data 3

MRD3

I

47

MAC Request Data 2

MRD2

I

48

MAC Request Data 1

MRD1

I

49

MAC Request Data 0

MRDO

I

50

Ground

GND

I

Pin #

Signal Name

51

Receive Start

RCSTART

0

52

Frame Control Recevied

FCRCVD

0

53

Short/Long Address Flag

FCSL

0

54

Individual/Group Address Flag

DAIG

0

55

Destination Address Received

DARCVD

0

56

My Destination Address Recognized

AFLAG

0

57

Ground

GND

I

58

Positive Power Supply

Vee

I

59

Source Address Received

SARCVD

0

2-238

C

"U

7.0 Signal Descriptions (Continued)

OJ

Co)
I\)

....
en

7.6 PINOUT SUMMARY (Continued)
TABLE 7·6. Pinout Summary (Continued)
Pin #

Signal Name

Symbol

1/0

60

My Source Address Recognized

MFLAG

0

61

Same Source Address

,SAMESA

0

62

Information Field Received

INFORCVD

0

63

Same MAC Information

SAMEINFO

0

64

Ground

GND

I

65

Positive Power Supply

Vee

I

,0

66

Ending Delimiter Received

EDRCVD

67

Valid Frame Check Sequence

VFCS

0

68

Valid Data Length

VDL

0

69

Token Received

TKRCVD

0

70

Format Error

FOERROR

0

71

Frame Stripped

FRSTRP

0

72

Media Access Control Reset

MCRST

0

73

MAC Indicate Parity

MIP

0

74

MAC Indicate Data 7

MID7

0

75

MAC Indicate Data 6

MID6

0

76

MAC Indicate Data 5

MID5

0

77

Ground

GND

I

78

Positive Power Supply

Vee

I

79

MAC Indicate Data 4

MID4

0

80

MAC Indicate Data 3

MID3

0

81

MAC Indicate Data 2

MID2

0

82

MAC Indicate Data 1

MID1

0

83

MAC Indicate Data 0

MIDO

0

84

Ground

GND

I

85

Valid Copy

VCOPY

I

86

Local Byte Clock

LBC

I

87

Local Symbol Clock

LSC

I

88

Ground

GND

I

89

Ground

GND

I

90

Ground

GND

I

91

Ground

GND

I

92

PHY Request Data 0

PRDO

0

93

PHY Indicate Data 0

PIDO

I

94

Positive Power Supply

Vee

I

95

PHY Request Data 1

PRD1

0

96

PHY Indicate Data 1

PID1

I

97

PHY Request Data 2

PRD2

98

PHY Indicate Data 2

PID2

I

99

PHY Request Data 3

PRD3

0

2·239

0

•

I

....

m
c

7.0 Signal Descriptions (Continued)
7.6 PINOUT SUMMARY (Continued)

TABLE 7-6. Pinout Summary (Continued)
Pin #

Symbol

Signal Name

1/0

100

Positive Power Supply

Vee

I

101

Ground

GND

I

102

PHY Indicate Data 3

PID3

I

103

.PHY Request Data 4

PRD4

0

104

PHY Indicate Data 4

PID4

I

105

PHY Request Data 5

PRD5

0

106

Positive Power Supply

Vee

I

107

PHY Indicate Data 5

PID5

I

108

PHY Request Data 6

PRD6

0

109

PHY Indicate Data 6

PID6

I

110

PHY Request Data 7

PRD7

0

111

PHY Indicate Data 7

PID7

I

112

PHY Request Control

PRC

0

113

PHY Indicate Control

PIC

I

114

PHY Request Parity

PRP

0

115

PHY Indicate Parity

PIP

I

116

Ground

GND

I

117

Positive Power Supply

Vee

I

118

Master Reset

RSf

I

119

Read/- Write

RIW

I

120

- Control Bus Enable

CE

I

121

-Interrupt

INT

0

122

- Acknowledge

~

0

123

Control Bus Address 0

CBAO

I

124

Control Bus Address 1

CBA1

I

125

Control Bus Address 2

CBA2

I

126

Control Bus Address 3

CBA3

I

127

Control Bus Address 4

CBA4

I

128

Ground

GND

I

129

Control Bus Address 5

CBA5

I

130

Control Bus Address 6

CBA6

I

131

Control Bus Address 7

CBA7

I

132

Control Bus Data 0

CBDO

I/O

2-240

.----------------------------------------------------------------------,0
"U

7.0 Signal Descriptions (Continued)

C»
Co)

N

....

7.7 PINOUT DIAGRAM

GND
RQRCLS3
RQRCLS2
RQRCLSI
RQRCLSD
RQRDY
RQSEND
RQEOF
RQFINAL
RQABT
TXPASS
TXRDY
TXACK
TXED
TXABORT
GND

Vee
TXCLASS
THTDIS
TXRINGOP
EA
EM

Q)

o

Vee

DP83261

BMAC

Vee

PRD5
PID4
PRD4
PID3
GND

Vee
PRD3
PID2
PRD2
PIDI
PRDI

Vee

MRP
MRD7
MRD6
MRD5
MRD4
MRD3
MRD2
MRDI
MROO
GND

PIOO
PROD
GND
GND
GND
GND
LSC
LBC
VCOPY
GND

TUF11 03B7 -11

FIGURE 7-21. DP83261132-Pin PQFP Pinout

Order Number DP83261AVF
See NS Package Number VF132A

•
2-241

....
CD
N
C')

CO

Il..

C

8.0 Electrical Characteristics
8.1 ABSOLUTE MAXIMUM RATINGS
If Military/Aerospace specified devices are required, please contact the National Semiconductor Sales Office/
Distributors for availability and specifications.
Symbol

Parameter

Min

Conditions

Max

Units

Vee

Supply Voltage

-0.5

7.0

V

VIN

DC Input Voltage

-0.5

Vee + 0.5

V

VOUT

DC Output Voltage

-0.5

Vee + 0.5

V

TSTG

Storage Temperature Range

-65

+150

·C

h

Lead Temperature

Soldering, 10 sec.
(IR or Vapor) (Phase Reflow)

230

·C

ESD Rating

RZAP
CZAP

BOO

V

=
=

1.5k,
120 pF

8.2 RECOMMENDED OPERATING CONDITIONS
Symbol

Parameter

Vee

Supply Voltage

PD

Power Dissipation

T

Operating Temp

Conditions

Min

Max

4.75

5.25

V

400

mW

70

·C

0

Units

8.3 DC ELECTRICAL CHARACTERISTICS
Symbol

Parameter

Conditions

=

VOHl

Minimum High Level
Output Voltage

Cl

VOH2

Minimum High Level
Output Voltage

IOH

VOll

Maximum Low Level
Output Voltage

Cl

= 50pF

VOL2

Maximum Low Level
Output Voltage

10l

= 4mA

VOl3

Maximum Low Level
Output Voltage INT
and ACK (Open Drain)

IOL

= BmA

=

50 pF
-2mA

Min

Max

Units

Vee - 0.5

V

2.4

V
0.4

V

0.4

V

0.4

V

VIH

Minimum High Level
Input Voltage

Vil

Maximum Low Level
Input Voltage

O.B

V

V

2.0

IIH

Input High Current

+10

p.A

III

Input Low Current

-10

p,A

10Zl

TRI·STATE Leakage for
CBD(7-0) and CBP

±10

p,A

IOZ2

TRI-STATE Leakage for
INT and ACK (Open Drain)

±10

p,A

IOZ3

Dynamic Supply Current

70m

rnA

Cl

= 50 pF. 12.5 MHZ

2-242

8.0 Electrical Characteristics (Continued)
8.4 AC ELECTRICAL CHARACTERISTICS
See Figures 8-8 and 8-9 for AC Signal and TRI-STATE Testing Criteria.
8.4.1 Control Bus Interface
Symbol
T1

Parameter

Min

Max

Units

CE Setup to LBC

15

T2

LBCPeriod

SO

T3

LBC to ACK Low

T4

CE Low to ACK Low

T5

LBC Low to CBD(7 -0) and CBP Valid

T6

LBC to CBD(7 -0) and CBP Active

T7

CE Low to CBD(7 -0) and CBP Active

225

475

ns

TS

CE Low to CBD(7 -0) and CBP Valid

265

515

ns

290

ns
ns
45

ns

540

ns

60

ns

60

ns

T9

LBC Pulse Width High

35

45

ns

T10

LBC Pulse Width Low

35

45

ns

45

ns

T11

CE High to ACK High

T12

R/IN, CBA(7-0), CBD(7-0) and
CBP Set up to CE Low

5

ns

T13

CE High to R/W, CBA(7-0),
CBD(7 -0) and CBP Hold Time

0

ns

T14

R/W, CBA (7-0), CBD(7-0)
and CBP Setup to LBC

20

ns
ns

T15

ACK Low to CE High Lead Time

0

T16

CE Minimum Pulse Width High

20

T17

CE High to CBD(7-0) and CBP TRI-STATE

T1S

ACK High to CE Low

0

ns

T19

CBD(7 -0) Valid to ACK Low Setup

20

ns

T20

LBC to INT Low

55

Asynchronous Definitions
T4(min)

T1

T4 (max)

T1

T7 (min)

T1

T7 (max)

T1

TS(min)

T1

TS (max)

T1

+ (3 * T2)
+ (6 * T2)
+ (2 • T2)
+ (5 • T2)
+ (2 • T2)
+ (5 • T2)

Note: MiniMax numbers are based on T2

~

ns
55

+ T3
+ T3
+ T6
+ T6
+ T9 + T5
+ T9 + T5

eo ns and T9 ~ T1 0 ~ 40 ns.

2-243

ns

ns

,..

~
C')
CIO

,---------------------------------------------------------------------------------,
8.0 Electrical Characteristics (Continued)

a.
C

Tl6
R/W
T13
CBA

ADDRESS VALID IN

CBD &:
CBP

DATA VALID IN
T1S

T4
TLlFI10387-28

FIGURE 8-1. Control Bus Interface Write Cycle

CE
T1S
T12
R/W
T13
CBA

ADDRESS VALID IN

CBD &:
CBP

T8
T19

T1S

T11

T4
TLIF110387-29

FIGURE 8-2. Control Bus Interface Read Cycle

2-244

C

8.0 Electrical Characteristics

""D
00
c.:I

(Continued)

N

0'1

.....

T16

R/W
T13
CBA

CBD &
CBP

TL/F/l0387-30

FIGURE 8-3. Control Bus Interface Synchronous Write Cycle

TL/F/l0387-31

FIGURE 8-4. Control Bus Interface Synchronous Read Cycle

2-245

fJI

.,...
CD
N

C')
CC)

a.
C

8.0 Electrical Characteristics (Continued)
8.4.2 Clock Signals
Symbol

Parameter

Min

Max

T21

LSC to LBC Lead Time (Skew Left)

-4

6

T22

LSC Pulse Width High

12

Units
ns
ns

T23

LSC Pulse Width Low

21

T24

LBC Pulse Width High

35

45

ns

T25

LBC Pulse Width Low

35

45

ns

T23
LSC

T22

r
'I

I

ns

121

I+-

LBC~

~
125

124

TUF/l0387-32

FIGURE 8·5. Clock Signals

8.4.3 PHY Interface
Symbol
T26

Parameter

Min

PHY Data Input Setup

15

Max

ns

Units

T27

PHY Data Input Hold

5

ns

T28

PHY Data Sustain

10

ns

T29

PHY Data Valid

45

I

LBC
126
PID7-0.
PIP, 8c PIC

ns

~

127

DOOOOQOOO~.

XXXXl

I--i
PRD7-0,
PRP, 8c PRC

129
T28

IXXXXXX
TL/F/l0387-33

Note: All setup and hold testing is done on single edges only (i.e., no combined setup/hold testing Is done for pulse signals. This Implies that the signal makes only
one low to high or high to low transition per CYcle).

FIGURE 8·6. PHY Interface Timing

2·246

-

C

"tI

8.0 Electrical Characteristics (Continued)

(X)
Co)
II.)
0)

8.4.4 MAC Interface

.....

Pin Groups
Group #

1/0

1

I

Pins
SAIGT, SAT, STRIP, EA, VCOPY, ROEOF, ROSEND, ROFINAL

2

I

RORDY

3

I

FCST, ROBCN, ROCLS(3-0), EM, ROABT

4

I

ROCLM

5

I

MRD(7-0), MRP

6

0

TXPASS, TXED, TXABORT, RCSTART, FCRCVD, SAMESA, INFORCVD, SAMEINFO, TXRDY, TXACK,
TXCLASS, THTDIS, TXRINGOP, DIAG, DARCVD, AFLAG, SARCVD, MFLAG, EDRCVD, VFCS, VDL, TKRCVD,
FOERROR, FRSTRIP, MACRST

7

0

MID(7-0), MIP

Symbol

Max

Units

Parameter

Min

T30

MAC Control Setup (Groups # 1 and # 3 and # 4)

15

ns

T31

MAC Control Setup (Group #2)

30

ns

T32

MAC Control Hold (Group #3)

2

ns

T33

MAC Control Hold (Groups #1 and #2 and #4)

5

ns
ns

T34

MAC Data Setup (Group #5)

15

T35

MAC Data Hold (Group #5)

6

ns

T36

MAC Control Sustain (Group #6)

15

ns

T37

MAC Control Valid (Group #6)

T3B

MAC Data Sustain (Group # 7)

T39

MAC Data Valid (Group #7)

45
15

ns
ns

45

ns

LBC
130
131
T34
IofAC INPUTS
GROUPS 1-5

T32
T33
135

T30
T31,
T34

r--

IXXXXXXXX~

XXXXl
_

IofAC OUTPUTS
GROUPS 6-7

T36
T38

T37
T39

XXXXXX
TUF/I0387-34

Note: All selup and hold testing is done on single edges only (i.e., no combined setup/hold testing is done for pulse signals. This implies that the signal makes a
single low to high or high to low transition per cycle).

FIGURE 8·7. MAC Interface Timings

2·247

....

CD
C'II

C")

CO

a.
Q

8.0 Electrical Characteristics (Continued)
Test Conditions for AC Testing
VIH

3.0V

VIL

O.OV

VOH

1.SV

VOL

1.SV

IOL

8.0 mA (AeR, iliJ'I')

CL

SOpF

AC Signal Testing

REF SIGNAL

MEASURE SIGNAL

MEASURE SIGNAL

MEASURE SIGNAL
TUF/t0387-35

Nole: All setup and hold testing is done on single edges only (i.e.. no combined setup/hold testing Is done lor pulse signals. This Implies that the signal makes only
one single low to high or high to low transition per cycle).

FIGURE 8-8. A.C. Signal Testing
TRI-STATE Timing

LBC

50%

CBD(7-0) .II CBP

CBD(7-0) .II CBP

VOL + 0.5V
TUF/t0387-36

FIGURE 8-9. TRI-STATE Timing

2-248

.----------------------------------------------------------------------,0
"'C
8.0 Electrical Characteristics (Continued)

co

W
N

....
Q)

Test Equivalent Loads
VOL2 Testing

VOH2 Testing

61''-

~
I

OUT OUTPUT

i

SOPf

SOPf
TL/F/103B7-3B

TL/F/103B7-37

Tlo-trl

Thi-tri

61''-

~
I

18!smA

~"ft~"
I

SOPf

SOPf
TLlF/103B7-40

TL/F/103B7-39

Open Drain VOL Testing

T~!smA
I

AC, VOL1, VOH1 Testing
OUT OUTPUT

OUT OPEN
DRAIN OUTPUT

TL/F/103B7-42

S0Pf

TL/F/103B7-41

FIGURE 8-10. Test Equivalent Loads

fI

2·249

Appendix A. Ring Engine State Machines
A.1 RECEIVER
A.1.1 MAC Receiver State Diagram
RO: LISTEN
DISABLE lVX

Rl:AWAIT SO
PH_INDICATION(II)

R(Ol)

RESET TVX; ENABLE TVX
MAC_RESET

R(10A)

PH_INVALID

R(10B)

SET RELR.PINV

R5:CHECK_TK
PH_INDICATlON(II)

R(SlA)

MAC_RESET

SIGNAL FR_STRIP

R(SOA)

PH_INVALID

R(SOB)

SIGNAL FO_ERROR; INC LOSLCT; SET RELR.PINV

PH_INDICATlON(NOT{II, TT)

R(SlB)

SIGNAL FO_ERROR;
INC LOSLCT

R2:RC FR CTRL
AFTER FCr & FCr

R(2S)

AFTER PH_INDICATION(TT)

R(SlC)

= TOKEN

TlLRECEIVEDJCTlONS

PH_INDICATION{JK)
SIGNAL RC_START; CLEAR A, M, E, L, H-FLAGS

MAC_RESET

R(20A)

PH_INDICATION(II)

R(21 A)

SIGNAL FR_STRIP
PH_INDICATlON(NOT(II, NN»

R(21 B)
PH_INVALID
SIGNAL FO_ERROR;
INC LOSLCT;
SET RELR.PINV

SIGNAL FO_ERROR; INC LOSLCT

R3: RC FR BODY
DA. SA. CT ACTIONS

R(20B)

R(23)

AFTER FCr & FCr .. TOKEN
IF FCr

= NSA THEN

SET N_FLAG

MAC_RESET

R(31 B)

R4:RC FR STATUSl
AR ACTIONS

R(31 C)

PH_INDICATION(TK)
EDJCTlONS
R(41)
PH_INVALID
SET RELR.PINV

SIGNAL FR_STRIP
PH_INDICATlON(NOT(II. TK. nT. NN»
SIGNAL FO_ERROR;
INC LOSLCT

R(30B)

SIGNAL FO_ERROR; INC LOSLCT; SET RELR.PINV

R(40A)

PH_INDICATION(II)

R(31A)

R(30A)

PH_INVALID

MAC RESET

R(12)

R(34)

PH_INDICATION (nT)
SIGNAL FILRECElVED;
SIGNAL EDRCVD;
INC FRAME..CT;
IF ER " S INC ERROILCT

PH_INDICATlON(NOT(RR, RS, RT, SR, SS, sT)

R6:RC FR STATUS2

R(40B)

R(46) PH_INDICATlON(RR, RS, RT, SR, SS, ST}
R(61)
PH_INVALID

PH_INDICATlON(NOT(RR, RS,
RT, SR, 5S, sT)

R(60)

SET RELR.PINV

TUF/10387-43

FIGURE A·1, Ring Engine Receiver State Diagram

2-250

C

Appendix A. Ring Engine State Machines (Continued)

"'tJ
CD

A.l.2 MAC RECEIVER FOOTNOTES

en
.....

~

A 1.2.1 Internal Conditions
(1) ESA:

Option.Enable_Short_Address
(2)ELA:

Option.Enable_Long_Address
(3)IRR:

Option.Inhibit_Recovery_Required I

(~ESA

& ~ELA)

(4)IFCS:

Option. Implementer_FCS
(5)EMIND:

Option.External_Matching_Indicators
(6) MAC_Reset:

Function.MAC_Reset

I~Mode.Run

A.l.2.2 Transition Conditions
(1) PH_Invalid:

See encoding of PH_Invalid in Section 7.2.1.1
(2) PH_Indication (Sl S2):

Sl is the first symbol received, S2 is the second symbol received. See encoding of
PH_ Indication in Section 7.2.1.1
(3) Transition R( 12):

This Transition may be a 0 time transition from any state except RO:Listen
A.l.2.3 Actions
1. DA-Actlons:

IF FC.L = 0 CLEAR FCSL ;short address
ELSE SET FCSL ;long address
After DAOr
IF DA.IG = 0 CLEAR DAIG ;individual address
ELSE SET DAIG ;group address
IF FCSL = 0 ;short address
After DAlr
SIGNAL DARCVD
IF DAIG = 1
THEN IF DAr is contained in set of Group Addresses
THEN SET A_Flag
IF DAIG = 0
THEN IF DAr = MSA
THEN SET A_Flag
IF FCSL = 1 ;long address
After DA5r
SIGNAL DARCVD
IF DAIG = 1
THEN IF DAr is contained in set of Group Addresses
THEN SET A_Flag
IF DAIG = 0
THEN IF DAr = MLA
THEN SET A_Flag
NOTE: A_Flag may be set on reception of VOID frames.

2-251

II

...

CD
N

('I)

fc

r-------~--------------------------------------------------------------------------__,

Appendix A. Ring Engine State Machines (Continued)
2. SAJctlons:
IF FCSL = 0; short address
After SAlr
SIGNAL SARCVD
IF ESA
THEN IF SAr = MSA
THEN SET MFLAG. Signal FR_Strip
ELSE IF SAr > MSA THEN
SET HFLAG
ELSE SET LFLAG
IF ((SAr = previous SArI & (previous FCSL = 0) &
(FC.FF = ~MAC & previous FC.FF = ~MAC) THEN
SIGNAL SAMESA
IF FCSL = 1: long address
After SA5r
SIGNAL SARCVD
IF ELA
THEN IF SAr = MLA
THEN SET MFlag. Signal FR_Strip
ELSE IF SAr > MLA
THEN SET H_Flag
-ELSE SET L_Flag
IF ((SAr = previous SArI & (previous FCSL = 1) &
(FC.FF = ~MAC & previous FC.FF = ~MAC)
THEN SIGNAL SAMESA
NOTE; A station, with a null address may not win Claim when Option.IRR is set ••
3. CT-Actions:
After 4_Info_Octets
If FCr = Claim
IF T_Bid_Rc
TREQ
CLEAR MFLAG
IF T_Bid_Rc > TREQ
THEN IF L_Flag
SET H_Flag
CLEAR L_Flag
ELSE IF H_Flag
SET L_Flag
CLEAR H_Flag
IF L_Flag
SIGNAL FR_Strip
IF ((INFOr = previous INFO) & (FCSL = previous FCSL) &
(FC.FF = MAC'& previous FC.FF'= MAC)
THEN SIGNAL SAME INFO

*'

4. TLRecelved-Actions:
IF Token_Class = Restricted
THEN IF ~R_Flag
THEN SET R_Flag
SET TELR.ENTRMD [Entered_Restricted_Model
ELSE RESET TVX
CLEAR R_Flag
SIGNAL TK_Received
INC TKCT [token countl
SET CILR.TKRCVD [Token-Receivedl

2-252

Appendix A. Ring Engine State Machines (Continued)
5. ED-AcUons:

INC FRCT {Frame_Received_Ctl
SIGNAL FR_Received, EDRDVD
SET CILR.FRRCV
If Valid_Data_Length & (Valid_FCS_Rc I (FCr = Void)
(FCr = Implementer and ~(Option.IFCS»
THEN RESET TVX;
IF (A_Flag I(EA & Option.EMIND» & VCOpy
THEN SET C_Flag
ELSE SET E_Flag {This E_Flag is used during rest of the ED_Actionsl
CLEAR A_Flag, M_Flag, H_Flag, L_Flag
IF Er
S & E_Flag
THEN INC EICT {Error_Ctl
SET CILR.FREI {Frame_Error_Isolatedl
IF Er = R & ~E_Flag
THEN
IF FCr = Claim
THEN SET RELR.CLM
IF A_Flag & M_Flag
THEN SIGNAL My_Claim
SET RELR.MYCLM
CLEAR R_Flag
SET TNEG = T_Bid_Rc
IF H_Flag
THEN SIGNAL Higher_Claim
SET RELR.HICLM
CLEAR R_Flag
SET TNEG = T_Bid_Rc
IF L_Flag
THEN SIGNAL Lower_Claim
SET RELR.LOCLM
CLEAR R_Flag
IF FCr = Beacon
THEN SET RELR.BCN
IF M_Flag
THEN SIGNAL My_Beacon
SET RELR.MYBCN
CLEAR R_Flag
IF ~ (M_Flag IE_Flag)
THEN SIGNAL Other_Beacon
SET RELR.OTRBCN
CLEAR R_Flag
IF FCr = Other_MAC
THEN SIGNAL Other_MAC
SET RELR.OTRMAC
IF FCr = VOID
THEN
IF M_Flag & A_Flag & ~DAIG
SIGNAL My_Void
ELSE IF ~A_Flag
SIGNAL Void
ELSE IF ~M_Flag
SIGNAL Other_Void

'*

2·253

fI

~ r-------~------------------------------------------------------------~----~--~

CD
C'I
('I)

'CO

DC

Appendix A. Ring Engine State Machines (Continued)
6. ArJctlons:
After Ar
IF Ar = R
THEN CLEAR N_Flag
IF A_Flag & Ar = S & DA.IG = 0 & ~E_Flag'
THEN SET RELR.DUPADD (Duplicate_Address I Strip Error' detected}
IF REVl & ~E_Flag & (A_Flag I (EA & EMIND)) & FCr 9= (MAC I Void) .
IF (VCOPY & FCr 9= NSA) I (VCOPY & FCr = NSA & Ar = R)
THEN SET CILR.FRCOP
INC FCCT (Frame_Copied_Ct}
ELSE IF ~VCOPYI (FCr =' NSA & Ar = S)
SET CILR.FRNCOP
INC FNCT (Frame_Not_Copied_Ct}
IF REV2 & ~E_Flag & (A_Flag I (EA & EMIND)) & FCr 9= (MAC I Void) & ~ (FCr =
NSA & Ar = S)
IF VCOPY
THEN SET CILR.FRCOP
INC FCCT (Frame_Copied_Ct}
ELSE SET CILR.FRNCOP
INC FNCT (Frame_Not_Copied_Ct}

2-254

C

-a
01)

Appendix A. Ring Engine State Machines (Continued)

w

N

A.2 TRANSMITTER

Q)

......

A.2.1 MAC Transmitter State Diagram

TO:TLIDlE

T4: ClAIM_TK

11: REPEAT
RC_START Ie

T(OI)

VOID_STRIP Ie

~

= TOKEN

BErORE rcx /I; rCr

~

llCRECEIVED Ie

~

IRPT

Ie CAPTURE-TK

T(10A)

IRPT

T(10B)

PASS_ACTIONS

I rO_ERROR

rR_STRIP

RECOVERY-ACTIONS

T(IOC)

MAC_RESET I IRPT

T(IOO)

RESET-ACTIONS
rR-RECEIVED

T(10E)

TILRECEIVED I< USABLE-TOKEN I<

T(02A)

RECOVERY-REQUIRED

T(14)

~ ITC

T2:TLDATA
Ie

~ IRPT

CAPTURUCnONS
USABlUMMEDIATE Ie

T(02B)

~ ITC

RESET_REQUIRED
RESET-ACTIONS

= LOPR;

RESET lMAX

= NONE

T(20B)

SET LATE

T(22)

T7:TX VOID
llCRECEIVED /I;

~ USABLE-TOKEN

~ITC

T(07)

I<

I

I<

T(27)

ArTER rsx &:

T(72)

SET VSENT

~ TX.PASS

~ TX.PASS

<~:I

RECOVERY-REQUIRED

T(74)

ANOTHER_VOID

ArTER rsx Ie

ELSE ArTER rsx Ie TX.PASS Ie
SEND_VOID

~IRPT

PASS-ACTIONS

RECOVERY-ACTIONS

T(20A)

ELSE ArTER rsx I< TX.PASS I< TX.CLASS
RESET TRT

RECOVERY-REQUIRED

T(24)

IMMEDIATE-ACTIONS

RECOVERY-ACTIONS

T(77)

MY-CLAIM I<

I

~ ITR /I; ~ IRPT

T(47)

START-ACTIONS

RESET_REQUIRED

T(70A)

RESET-ACTIONS
ELSE ArTER rsx /I; TX.PASS '"
TX.CLASS ¢ NONE
RESET TRT = LOPR;
SET LATE

T3; ISSUE-TK

T(70B)
T(73)

ELSE ArTER rsx &: TX.PASS '"
TX.CLASS ¢ NONE

llCRECEIVED '" ITC Ie ~ IRPT

T(03)

PASS-ACnONS

T(34)

RESET_REQUIRED

RECOVERY_REQUIRED
RECOVERY-ACTIONS

T(30A)

RESET-ACTIONS
ArTER ED(lT)

T(30B)

ISSUUCTIONS

RECOVERY-REQUIRED

T(04)

RECOVERY-ACnONS
RESET_REQUIRED

T(40)

RESET-ACTIONS
T(OO)

I

T5: TX BEACON

RESET-ACTIONS

TRT EXPIRES

MAC-'!ESET I (OTHER_BEACON '" ~ IRPT)
RESET-ACTIONS
T(OS)

fII

RESET_REQUIRED

BEACON_REQUEST
RESET TRT

SET BEACON_TYPE = UNSUCCESSrUl CLAIM;
SET DA = NUll; RESET-ACTIONS

T(SO)

T(54)

= LOPR

T(45)

MY-BEACON'" (CLAIM_REQUEST I .."RR)
RECOVERY-ACTIONS
Tl/F/l0387-44

FIGURE A·2. Ring Engine Transmitter State Diagram
2-255

..CD
N
C')

Appendix A. Ring Engine State Machines (Continued)

CO

a..

C

A.2.2 MAC TRANSMITTER FOOTNOTES
A.2.2.1 Internal Conditions
(1) ESA:

Option.Enable_Short_Address
(2) ELA:

Option.Enable_Long_Address
(3)IRPT:

Option. Inhibit_Repeat

I

(,ESA & ,ELA)

(4)ITC:

Option. Inhibit_Token_Capture
(5)IRR:
(6)ITR:

Option. Inhibit_Token_Release
(7)IFCS:

Option. Implementer_FCS
(8)EMIND:

Option. External_Mat ching_Indicators
(9) MAC_Reset:

Function.MAC_Reset I ,Mode.Run
(10) Beacon,Request:

Function.Beacon_Request & ,MAC_Reset
(11) Claim_Request:

Function.Claim_Request & ,Beacon_Request & ,MAC_Reset
A.2.2.2 Transition Conditions
(1) Usable_Token:

Ring_Operational & ,RQ.Send &
((RQ.Class = synchronous & ,RELR.Beacon_Received)
(RQ.Class = asynchronous & ,Late & RQ.Class.Capture = FCr.L &
(RQ.Class oF priority I TRT < T_Pri[RQ.Class.Priority]) &
,(RQ.Class = restricted &
(RELR.Beacon_Received I RELR.Claim_Received I
(RQ.Class.Capture = nonrestricted & ,RbeginOK)))))
(2) Capture_TK:

,ITC & ,IRPT & (Usable_Token I
(Ring_Operational & ,TELR.Ring_Latency_Valid & ,Late & ,FCr.L))

(3) Immediate Request:

RQ.Class

=

immediate & ,RQ.Claim & ,RQ.Beacon

(4) Usable_Immediate:

,Ring_Operational & TX.Class = none &
,(TK_Received & ,IRPT) & ,RQ.Send & Immediate_Request
(5) Send_Void:

TX.Abort I
(After FSx &
((TX.Ready &
(,RQ.Ready I ((Immediate_Request I Lmax expired) & ,RQ.Send))
(TX.Pass &;
(Void_Strip I (,TELR.Ring_Latency_Valid & Early)
,(TX.ED I TX.Class = none))

2-256

I

Appendix A. Ring Engine State Machines (Continued)
(6) Another_Void:

After FSx & TX.Pass & Void_Strip & ,Vsent
(7) ReseLRequired:

MAC_Reset I
(,IRPT & (Higher_Claim I Other_Beacon I Other_MAC» I
(IRPT &: (T3 I (TO & (Ring_Operational I TX.Class 7'= none I ,Late»»
Note: Any other MAC frame received while RING_Operational must be a My_Claim or a bad frame. These frames are ignored here.

(8) Recovery_Required:

Claim_Request I
(,IRR &:
(Lower_Claim I My_Beacon I TVX expires I
(TRT expires &: Late & ,«TO I TIl & TK_Received»»
Nole: (Ring_Operational & T_Opr < T-Req) must be detected by softwarel

A.2.2.3. Transition Actions
(1) PassJctions:

CLEAR TX.Ready, Void_Strip;
IF Tl THEN SET RbeginOK = ,FCr.L;
SET TX.Class = FCr.L; SET TX.Pass, TELR.Token_Passed;
If Ring_Operational
THEN IF ,Late
THEN RESET TRT = T_Opr
ELSE CLEAR Late
ELSE SET T_Opr
T_Neg; RESET TRT
T_Opr; SET Late;
SET RELR.Ring_Operational_Set, Ring_Operational

=

=

(2) Capture-Actions:

CLEAR TX.ED,
SET TX.Class
RESET Lmax;
IF ,Late
THEN
ELSE

TX.Abort, TX.Pass, Void_Strip;

= FCr.L; SET TX.Ready, TELR.Token_Captured;
SET Early; SET THT
CLEAR Early, Late

=TRT; RESET

TRT

=T_Opr

(3) Immedlate-Actlons:

CLEAR TX.ED, TX.Abort, TX.Pass, Void_Strip;
SET TX.Class = none; SET TX.Ready;
SET Early; RESET TRT = T_Opr; CLEAR Late
(4) Reset-Actions:
IF T41T51(T2 &: ,TX.Ready &: ,TX.Pass &: ,TX.ED)

THEN SET TX.Abort
CLEAR TX.Ready, TX.Ack, Void_Strip;
SET TX.Class = none; SET TX.Pass;
SET T_Opr
T_Max; RESET TRT
T_Opr; SET Late;
IF Ring_Operational
THEN SET RELR.Ring_Operational_Reset
IF MAC_Reset IRing_operational
CLEAR Late_Count, Ring_Operational, Function.MAC_Reset

=

=

2-257

~ r-----------------------~------------------------------------------------------------,

~
co
C")

Appendix A. Ring Engine State Machines (Continued)

a.

(5) Recovery-Actlons:

C

IF T2 & ~TX.Ready & ~TX.Pass & ~TX.ED
THEN SET TX.Abort
IF T5
THEN CLEAR TX.Abort
CLEAR TX.Ready, TX.Ack, Void_Strip;
SET TX.Class = nonrestricted; SET TX.Pass;
SET T_Opr T_Max; RESET TRT
T_Opr; SET Late;
IF Ring_Operational
THEN SET RELR.Ring_Operational_Reset;
CLEAR Late_Count, Ring_Operational

=

=

(6) StarLActlons:

CLEAR TX.Ready, TX.Ack, TX.Abort; SET Void_Strip, TX.Pass;
RESET TRT = T_Opr
(7) Issue-Actlons:

IF

~Ring_Operational

=

THEN SET T_Opr T_Neg; RESET TRT
IF TX.Class = nonrestricted & ~R_Flag
THEN SET RbeginOK
ELSE CLEAR RbeginOK

= T_Opr;

SET Late

A.2.2.4 State Actions
(1) TRT-Actlons:

Always:
IF TRT expires
THEN RESET TRT = T_Opr;
IF ~ «Tolnl & TK_Received & ~IRPTl
THEN IF ~Late
THEN SET Late
ELSE SET TELR.TRT_Expired;
IF ~Ring_Operational
THEN INCREMENT Late_Count
IF (T4 & ~(My_Claim & ~ITR & ~IRPTlll
(T5 & ~(My_Beaoon & (Claim_Requestl~IRRlll
THEN SET TELR.Recovery_Failed
(2) RLCT-Actlons:

Always:
IF TELR.Ring_Latenoy_ValidIMAC_Resetl (~ESA & ~ELAll
(TRT expires & LatellPH_Invalidl
Lower_ClaimlMy _BeaoonlHigher_Claiml
Other_BeaoonlOther_MACITK_Recei vedlOther _Void
THEN DISABLE Latency_Count
IF My_Void & Latency_Count enabled
THEN SET TELR.Ring_LatencY_Valid
(3) T)Lldle-Actlons (TO):

Always:
PH_Data. request (Ill ;
IF My_VoidIOther_Void
THEN CLEAR Void_Strip

2·258

.----------------------------------------------------------------------.0
"tI
Appendix A. Ring Engine State Machines (Continued)

co

Co)
Po)
Q)

(4) RepeaLActlons (T1):

IF -llRPT II: (Higher_ClaimIOther_BeaconIOther_MACl II:
(Ring_Operationallrx.Class oF nonel,Late)
THEN SET TX.Class = none;
SET T_Opr = T_Max; RESET TRT = T_Opr; SET Late;
IF Ring_Operational
THEN SET RELR.Ring_Operational_Reset;
CLEAR Late_Count. Ring_Operational
Still-Usable:
Ring_Operational II: ,RQ.Send II:
«RQ.Class = synchronous II: ,RELR.Beacon_Receivedll
(RQ.Class
asynchronous II: ,Late II: RQ.Capture
FCr.L II:
(RQ.Class oF prioritylTRT < T_Pri[RQ.Class.Priority)l II:
,(RQ.Class = restricted II:
(RELR.Beacon_ReceivedIRELR.Claim_Receivedl
(RQ.Class.Capture = nonrestricted II: ,RbeginOKlllll

=

=

(5) T}L.DatLActlons (T2):

IF Lmax

= expired

II: RQ.Ready
THEN RESET Lmax; SET Used
IF ,RQ.Ready
THEN RESET Lmax; CLEAR Used
IF Abort
THEN SET TX.Abort;
IF Still_Usable
THEN SET TX.Ready
ELSE SET TX.Pass
After ED
SET rx.ED;
IF Still_Usable
THEN SET TX.Ready
ELSE SET TX.Pass

(6) IssuL-TKJctions (T3):

Always:
IF My_Void
THEN CLEAR Void_Strip
(7) Clal'"-.TKJctlons (T4):

CLEAR Function. Claim_Request·
(8) T}L.BeaconJctlons (T5):

CLEAR Function.Beacon_Request
(9) T}L.VolcLActlons (T7):

Always:
IF MY_Void II: Vsent
THEN CLEAR Void_Strip

2-259

....

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,

CD

C'I
('I)

CO

a.
Q

~National

PRELIMINARY

~ Semiconductor

DP83265 BSITM Device
(FOOl System Interface)
General Description

Features

The DP83265 BSI device implements an interface between
the National FOOl BMACTM device and a tiost system. It
provides a multi-frame, MAC-level interface to one or more
MAC Users.
The BSI device accepts MAC User requests to receive and
transmit multiple frames (Service Data Units). On reception
(Indicate), it receives the byte stream from the BMAC device, packs it into 32-bit words and writes it to memory. On
transmission (Request), it unpacks the 32-bit wide memory
data and sends it a byte at a time to the BMAC device. The
host software and the BSI device communicate via registers, descriptors, and an attention/notify scheme using clustered interrupts.

• 32-blt wide Address/Data path with byte parity
• Programmable transfer burst sizes of 4 or 8 32-bit
words
• Interfaces to low-cost DRAMs or directly to system bus
• 2 Output and 3 Input Channels
• Supports Headerllnfo splitting
• Bridging support
• Efficient data structures
• Programmable Big or Little Endian alignment
• Full Duplex data path allows transmission to self
• Confirmation status batching services
• Receive frame filtering services
• Operates from 12.5 MHz to 25 MHz synchronously with
host system
TO HOST SYSTEM

fJ;J.Kf.t~iE~:*f:m

~.: (SYSTEM INTERFACE) :. ;
.~ :.: :.: :.: :.:..:.: :.: :.: :.;.........:.; ;.; ,'.;:

.. .. .. .. .. .. ..

.. ..

DP83241
CDD
(CLOCK
DISTRIBUTION)

DP83231
CRD
(CLOCK
RECOVERY)

"---v----'
TO FIBER OPTIC
TRANSCEIVER PAIR

FIGURE 1. FOOl Chip Set Block Diagram

2-260

TL/F/10791-1

r-----------------------------------------------------------------,c
Table of Contents
5.0 CONTROL INFORMATION
1.0 FOOl CHIP SET OVERVIEW

5.1 Overview

2.0 ARCHITECTURE DESCRIPTION

5.2 Operation Registers

2.1 Interfaces

5.3 Control and Event Register Descriptions

2.2 Data Structures

5.4 Pointer RAM Registers

2.3 Map Engine

5.5 Limit RAM Registers
5.6 Descriptors

3.0 FEATURE OVERVIEW
3.1 32-Bit address/Data Path to Host Memory

5.7 Operating Rules

3.2 Multi-Channel Architecture

5.B Pointer RAM Register Descriptions

3.3 Support for Header/Info Splitting

5.9 Limit RAM Register Descriptions

3.4 MAC Bridging Support

5.10 BSI Device Descriptors

3.5 Confirmation Status Batching Services

6.0 SIGNAL DESCRIPTIONS

3.6 Receive Frame Filtering Services

6.1 Pin Organization

3.7 Two Timing Domains

6.2 Control Interface

3.B Clustered Interrupts

6.3 BMAC Device Indicate Interface
6.4 BMAC Device Request Interface

4.0 FUNCTIONAL DESCRIPTION
4.1 Overview

6.5 ABus Interface

4.2 Operation

6.6 Electrical Interface

4.3 Bus Interface Unit

2-261

"U

co
Co)

~

en

~

re

C')

~

c

r---------------------------------------------------------------------------------,
1.0 FDDI Chip Set Overview
National Semiconductor's FOOl chip set consists of five
components as shown in Figure 1-1. For more information
about the other devices in the chip set, consult the appropriate data sheets and application notes.

DP83261 BMACTM Device
Media Access Controller
The BMAC device implements the Timed Token Media Access Control protocol defined by the ANSI FOOl X3T9.5
MAC Standard.

DP83231 CRDTM Device
Clock Recovery Device

Features

The Clock Recovery Device extracts a 125 MHz clock from
the incoming bit stream.

• All of the standard defined ring service options
• Full duplex operation with through parity
• Supports all FOOl Ring Scheduling Classes (Synchronous, Asynchronous, etc.)
• Supports Individual, Group, Short, Long and External
Addressing

Features
• PHY Layer loopback test
• Crystal controlled
• Clock locks in less than 85 p.s

• Generates Beacon, Claim, and Void frames internally

DP83241 CDDTM Device
Clock Distribution Device

• Extensive ring and station statistics gathering
• Extensions for MAC level bridging
• Separate management port that is used to configure and
control operation

From a 12.5 MHz reference, the Clock Distributon Device
synthesizes the 125 MHz, 25 MHz, and 12.5 MHz clock required by the BSI, BMAC, and PLAYER devices.

• Multi-frame streaming interface

DP83251/55 PLAYERTM Device
Physical Layer Controller

DP83265 BSITM Device
System Interface

The PLAYER device implements the Physical Layer (PHY)
protocol as defined by the ANSI FOOl PHY X3T9.5 Standard.

The BSI Device implements an interface between the
BMAC device and a host system.

Features

Features

• 32-bit wide Address/Data path with byte parity
• Programmable transfer burst sizes of 4 or 8 32-bit words
• Interfaces to low-cost DRAMs or directly to system bus

• 4B/5B encoders and decoders
• Framing logic
• Elasticity Buffer, Repeat Filter and Smoother

• Provides 2 Output and 3 Input Channels

• Line state detector/generator

• Supports Header/Info splitting
• Efficient data structures
• Programmable Big or Little Endian alignment

• Link error detector
• Configuration switch
• Full duplex operation
• Separate management port that is used to configure and
control operation
In addition, the DP83255 contains .an additional
PHY_Data. request and PHY_Data.indicate port required
for concentrators and dual attach stations.

• Full duplex data path allows transmission to self
• Confirmation status batching services
• Receive frame filtering services
• Operates from 12.5 MHz to 25 MHz synchronously with
host system

2-262

2.0 Architecture Description
The BSI device is comppsed of three interfaces and the
Map Engine,
'

The Control Bus Interface is separate from the BMAC device and ABus Interfaces to 'allow independent operation of
the Control Bus.

The three interfaces are the BMAC device, the ABus, and
the Control Bus. They are used to connect the BSI device to
the BMAC device, Host System, and external Control Bus.

The host uses the Control Bus to access the BSI device's
internal registers, and to manage the attention/notify logic.

The Map Engine manages the operation of the BSI device.

2.2 DATA STRUCTURES

2.1 INTERFACES

2.2.1 Data Types

The BSI device connects to external components via three
interfaces: the BMAC device Interface, the ABus Interface,
and the Control Bus Interface (see Figure 2-1).

The architecture of the BSI device defines two basic kinds
of objects: Data Units and Descriptors. A Data Unit is a
group of contiguous bytes which forms all or part of a frame
(Service Data Unit). A Descriptor is a two-word (64-bit) control object that provides addressing information and control/
status information about BSI device operations.

2.1.1 BMAC Device Interface
The BSI device connects to the BMAC device via the
MA-Indicate (receive) and MA-Request (transmit) Interfaces, as shown in Figure 2-1.
'

Data and Descriptor objects may consist of one or more
parts, where each part is contiguous and wholly contained
within a 1k or 4k memory page. A single-part object consists.
of one Only Part; a multiple-part object consists of one First
Part, zero or more Middle Parts, and one Last Part. In Descriptor names, the object part is denoted in a suffix, preceded by a dot. Thus an Input Data Unit Descriptor (IDUD),
which describes the last Data Unit of a frame received from
the ring, is called an IDUD.Last.

Received Data is transferred from the BMAC device to
the BSI device via the MA-Indicate Interface. the
MA-Indicate Interface consists of a parity bit (odd parity)
and byte-wide data along with flag and control signals.
Transmit Data is transferred from the BSI device to
the BMAC device via the MA-Request Interface. The
MA-Request Interface consists of a parity bit (odd parity)
and byte-wide data along with flag and control signals.

A single-part Data Unit is stored in contiguous locations
within a single 4k byte page in memory. Multiple-part Data
Units are stored in separate, and not necessarily contiguous
4k byte pages. Descriptors are stored in contiguous locations in Queues and Lists, where each Queue or List occupies a Single 1k byte or 4k byte memory page, aligned on
the queue·size boundary. For both Queues and Lists, an
access to the next location after the end of a page will automatically wrap-around and access the first location in the
page.

2.1.2 ABus Interface
The BSI device connects to the Host System via the ABus
Interface. The ABus Interface consists of four bits of parity
(odd parity) and 32 bits of multiplexed address and data
along with transfer control and bus arbitration signals.

2.1.3 Control Bus Interface
The Control Bus Interface connects the BSI device to the
external Control Bus.
To HOST SYSTEM

Bus Control &:
Arbitration
Signal.

AB..AD(3t:O)

-

ABUS INTER.ACE

B
U
5

MAP ENGINE

I

I
N
T
E
R

I

•

BMAC INTERFACE

MA.JNDICATE(7:0)
MA.JNDICATE PARITY

Flags I<

Control
Signals

Transmit
Parameters &
Handshake
Signals

C
0
N
T
R
0
L

-

II

A
C
E

MILREQUEST(7:0)
MILREQUE5T PARITY

To BMAC DEVICE
TLlF/l079t -2

FIGURE 2·1. BSI Device Interfaces

2-263

~r-----------------~----------------~---------------------------------,

I
c

2.0 Architecture Description (Continued)
Data Units (MAC Service Data Units) are transferred between the BSI device and' BMAC device via five simplex
Channels, three used for Indicate (receive) data and two for
Request (transmit) data. Parts of frames received from the
ring and copied to memory are called' Input Data Units
(IDUs); parts of frames read from memory to be tansmilled
to the ring are called Output Data Units (ODUe).
Descriptors are transferred between the BSI device and
Host via the ABus, whose operation is 'for the most part
transparent to the user. There are five Descriptor types rec·
ognized by the BSI device: Input Data Unit Descriptors
(IOU Os}, Output Data Unit Descriptors (ODUDs); Pool
Space Descriptors (PSPs), Request Descriptors (REQs),
and Confirmation Message Descriptors (CNFs):
Input and Output Data Unit Descriptors describe a single
Data Unit part, i.e., its address (page number and offset),
its size In bytes, and its part (Only, First, Middle, 'or
Last). 'Frames consisting of a single part are described by
a Descriptor.Only; frames consisting of multiple parts
are described by a Descriptor.First, zero or more
Descriptor.Middles, and a Descriptor.Last.

Every Output Data Unit part is described by ari Output Data
Unit Descriptor (ODUD). Output Data Unit Descriptors are
fetched from memory so that frame parts can be assembled
for transmission,
Every Input Data Unit part is described by an Input Data Unit
Descriptor (lOUD). Input Data Unit Descriptors are generat·
ed on Indicate Channels to describe where the BSI device
wrote each frame part and to report status for the frame.
Request Descriptors (REQs) are wri~en by the user to spec·
ify the operational parameters for aSI deviCe Request oper·
ations. Request Descriptors also contain the start address
of part of a stream of ODUDs and the number of frames
represented by the ODUD stream part (i.e., the number of
ODUD.Last descriptors). Typically, the user will define a sin·
gle Request Object consisting of multiple frames of the
same request and service class, frame control, and expect·
ed status.
'
Confirmation Messages (CNFs) are created by the BSI de·
vice to record the result of a Request operation.
Pool Space Descriptors (PSPs) describe the location and
size of a region of memory space available for writing Input
Data Units.
Request (transmit) and Indicate (receive) data structures
are summarized in Figures 2·2 and 2-3.

--,
I

First ODU

REQuest.Only

~

I
I

I
I

I
I

I
I

.--------04
~_:r-----·

l
J

Frame #1

ODUD.Flrst

I--Last ODU

ODUD.Last
ODUD.F1rst
ODUD.Mlddle

I--First ODU

ODUD.Last

'1
Last ODU

Middle ODU

l

Frame #2

j

TL/F/l0791-3

FIGURE 2·2. aSI DeVice Request Data Structures

2·264

C

."

2.0 Architecture Description (Continued)

CD
Co)

N

r--+r---, -,

Q)

U1

Frame #1

I -_ _---I.-J

l
L..-----,J

Frame #2

IDUD.La.t

l

II~
I

r--------,

I
I

~-

l

I

- - - - - - -

~

La,t IOU

Frame #3

U------~ ~J
Middle ODU

TL/F/l0791-4

FIGURE 2·3. BSI Device Indicate Data Structures
2.2.2 Descriptor Queues and Lists
The BSI device utilizes 10 Queues and two Lists. These
queues and lists are circular. There are six Queues for Indicate operations, and four Queues and two Lists for Request
operations. Each of the three Indicate Channels has a Data
Queue containing Pool Space Descriptors (PSPs), and a
Status Queue containing Input Data Unit Descriptors
(lDUDs). Each Request Channel has a Data Queue containing Request Descriptors (REQs), a Status Queue containing
Confirmation Messages (CNFs), and a List containing Output Data Unit Descriptors (DOUDs).

2.3 MAP ENGINE
The Map Engine, which manages the operation of the BSI,
is comprised of seven basic blocks: Indicate Machine, Request Machine, Status/Space State Machine, Operation
RAM, Pointer RAM, Limit RAM, and Bus Interface Unit. An
internal block diagram of the BSI device is shown in Figure

2-4.
2.3.1 Indicate Machine
The Indicate Block accepts Service Data Units (frames)
from the BMAC device in the byte stream format (MA.-Indicate).

During Indicate and Request operations, Descriptor Queues
and Lists are read and written by the BSI device, using registers in the Pointer and Limit RAM Register files. The Pointer RAM Queue and List Pointer Registers pOint to a location
from which a Descriptor will be read (PSPs, REQs, and
ODUDs) or written (IDUDs and CNFs).

Upon receiving the data, the Indicate Block performs the
following functions:
• Decodes the Frame Control field to determine the frame
type
• Sorts the received frames onto Channels according to
the Sort Mode

For each Queue Pointer Register there is a corresponding
Queue Limit Register in the Limit RAM Register file, which
holds the Queue's limit as an offset value in units of 1 Descriptor (8 bytes). The address in the Queue Pointer is incremented before a Descriptor is read and after a Descriptor is
written, then compared with the value in the corresponding
Queue Limit Register. When a Descriptor is accessed from
the location defined by the Queue Limit Register, an attention is generated, informing the host that the Queue is empty. When a pOinter value is incremented past the end of the
page, it wraps to the beginning of the page.

• Filters identical MAC frames
• Copies the received frames to memory according to
Copy Criteria
• Writes status for the received frames to the Indicate
Status Queue
• Issues interrupts to the host at host-defined status breakpoints
2.3.2 Request Machine
The Request Machine presents Service Data Units (MAC
frames) to the BMAC device in the byte stream format
(MA.-RequestJ.
The Request Machine performs the following functions:

2.2.3 Storage Allocation
The maximum unit of contiguous storage allocation in external memory is a Page. All BSI device addresses consist of a
16-bit page number and a 12-bit offset.

• Reads frames from host memory and assembles them
onto Request Channels

The BSI device uses a page size of 1K or 4k bytes for storage of Descriptor Queues and Lists (as selected by the
user), and a page size of 4K bytes for storage of Data Units.
A Single page may contain multiple Data Units, and multiplepart Data Units may span multiple disjoint or contiguous
pages.

• Prioritizes active requests
• Transmits frames to the BMAC device
• Writes status for transmitted and returning frames
• Issues interrupts to the host on user-defined group
boundaries

2-265

•

U)

CD

N

~
a..

r---------------------------------------------------------------------------------,
2.0 Architecture Description (Continued)
Control

C

Address/Data

Bu. Clock

ABu. Interface

BIU
Bus Interface Un"

Control Bus

r---..., Interface
Data
Indicate
Burst

Request
Burst

FIFO

FIFO

Reque.t
Machine

Indicate
Machine
Indicate
Data

Request
Data

FIFO

FIFO

Indicate
Data

Control
Bus

1-____t>llndlcate
Control

Request 1+____-1 Request
Data
Control

BMAC Device
Interface

TL/F/10791-5

FIGURE 2·4. BSI Device Internal Block Diagram
3. Confirmation Message Descriptor stream

2.3.3 Status/Space Machine
The Status/Space Machine is used by both the Indicate Ma·
chine and the Request Machine.

4. Request Descriptor stream
The BIU arbitrates between the Subchannels and issues a
Bus Request when any Subchannel requests service. The
priority of Subchannel bus requests is generally as follows,
from highest priority to lowest priority:

The Status/Space Machine manages all descriptor Queues
and writes status for received and transmitted frames.

2.3.4 Bus Interface Unit

1. Output Data Unit reads (highest priority)

The Bus Interface Unit (BIU) is used by both the Indicate
and Request Blocks. It manages the ABus Interface, provid·
ing the BSI device with a 32·bit data path to local or system
memory.
The Bus Interface Unit controls the transfer of Data Units
and Descriptors between the BSI device and Host memory
via the ABus.
Data and Descriptors are transferred between the BSI de:
vice and Host memory in streams, where a stream is a flow
of logically related information (I.e., a single type of data or
descriptor object) in one direction (either to or from host
memory). Each Channel supports a subset of object
streams, via Subchannels. The three Indicate Channels
each support three Subchannels:
1. input Data Unit stream

2. Input Data Unit writes
3. Input Data Unit Descriptor writes

4.
5.
6.
7.

Confirmation Message Descriptor writes
Pool Space Descriptor reads
Mailbox reads/writes
Pointer RAM and Limit RAM Service functions (lowest
priority)

Addresses for Subchannel accesses are contained in the
Pointer RAM Registers.

2.3.5 Pointer RAM
The Pointer RAM Block is used by both the Indicate and
Request Machines. It contains pOinters to all Data Units and
Descriptors manipulated by the BSI device, namely, Input
and Output Data Units, Input and Output Data Unit Descrip·
tors, Request Descriptors, Confirmation Messages, and
Pool Space Descriptors.

2. input Data Unit Descriptor stream
3. Pool Space Descriptor stream

The two, Request Channels each support four Subchanne!s:
1. Output Data Unit stream
2. Output Data Unit Descriptor stream

2·266

3.2 MULTI-CHANNEL ARCHITECTURE
The BSI device provides three Input Channels and two Output Channels, which are designed to operate independently
and concurrently. They are separately configured by the
user to manage the reception or transmission of a particular
kind of frame (for example, synchronous frames only).

2.0 Architecture Description
(Continued)
The Pointer RAM Block is accessed by clearing the PTOP
(Pointer RAM Operation) bit in the Service Attention Register, which causes the transfer of data between the Pointer
RAM Register and a mailbox location in memory.

3.3 SUPPORT FOR HEADERIINFO SPLITTING
In order to support high performance protocol processing,
the BSI device can be programmed to split the header and
information portions of (non-MAC/SMT) frames between
two Indicate Channels. Frame bytes from the Frame Control
field (FC) up to the user-defined header length are copied
onto Indicate Channel 1, and the remaining bytes (info) are
copied onto Indicate Channel 2.

2.3.6 Limit RAM
The Limit RAM Block is used by both the Indicate and Request Machines. It contains data values that define the limits of the ten Queues maintained by the BSI device.
Limit RAM Registers are accessed by clearing the LMOP
(Limit RAM Operation) bit in the Service Attention Register,
which causes the transfer of data between the Limit RAM
Register and the Limit Data and Limit Address Registers.

3.4 MAC BRIDGING SUPPORT

3.0 Feature Overview

Support for bridging and monitoring applications is provided
by the Internal/External Sorting Mode. All frames matching
the external address (frames requiring bridging) are sorted
onto Indicate Channel 2, MAC and SMT frames matching
the internal (BMAC device) address are sorted onto Indicate
Channel 0, and all other frames matching the BMAC device's internal address (short or long) are sorted onto Indicate Channel 1.

The BSI device implements a system interface for the FOOl
BMAC Device. It is designed to provide a high-performance,
low-cost interface for a variety of hosts.
On the system side, the BSI device provides a simple yet
powerful bus interface and memory management scheme to
maximize system efficiency. It is capable of interfacing to a
variety of host busses/environments. The BSI device provides a 32-bit wide multiplexed address/data interface,
which can be configured to share a system bus to main
memory or communicate via external shared memory. The
system interface supports virtual addressing using fixed-size
pages.

3.5 CONFIRMATION STATUS BATCHING SERVICES
The BSI device provides confirmation status for transmitted
and returning frames. Interrupts to the host are generated
only at status breakpoints, which are defined by the user on
a per Channel basis when the Channel is configured for
operation.

On the network side, the BSI device performs many functions which greatly simplify the interface to the BMAC device, and provides many services which simplify network
management and increase system performance and reliability. The BSI device is capable of batching confirmation and
indication status, filtering out MAC frames with the same
information field, and performing network monitoring functions.

The BSI device further reduces host processing time by
separating received frame status from the received data.
This allows the CPU to quickly scan for errors when deciding whether to copy the data to memory. If the status were
embedded in the data stream, all the data would need to be
read contiguously to find the Status Indicator.
3.6 RECEIVE FRAME FILTERING SERVICES

3.1 32-BIT ADDRESS/DATA PATH TO HOST MEMORY

To increase performance and reliability, the BSI device can
be programmed to filter out identical (same FC and Info
field) MAC or SMT frames received from the ring. Filtering
unnecessary frames reduces the fill rate of the Indicate
FIFO, reduces CPU frame processing time, and avoids unnecessary memory bus transactions.

The BSI device provides a 32-bit wide synchronous multiplexed address/data interface, which permits interfacing to
a standard multi-master system bus operating from
12.5 MHz to 25 MHz, or to local memory, using Big or Little
Endian byte ordering. The memory may be static or dynamic. For maximum performance, the BSI device utilizes burst
mode transfers, with four or eight 32-bit words to a burst. To
assist the user with the burst transfer capability, the three
bits of the address which cycle during a burst are output
demultiplexed. Maximum burst speed is one 32-bit word per
clock, but slower speeds may be accommodated by inserting wait states.

3.7 TWO TIMING DOMAINS
To provide maximum performance and system flexibility, the
BSI device utilizes two independent clocks, one for the MAC
(ring) Interface, and one for the system/memory bus. The
BSI device provides a fully synchronized interface between
these two timing domains.

The BSI device can operate within any combination of cached/non-cached, paged or non-paged memory environments. To provide this capability, all data structures are contained within a page, and bus transactions never cross a
page. The BSI device performs all bus transactions within
aligned blocks to ease the interface to a cached environment.

3.8 CLUSTERED INTERRUPTS
The BSI device can be operated in a polled or interrupt-driven environment. The BSI device provides the ability to generate attentions (interrupts) at group boundaries. Some
boundaries are pre-defined in hardware; others are defined
by the user when the Channel is configured. This interrupt
scheme significantly reduces the number of interrupts to the
host, thus reducing host processing overhead.
(

2-267

c-g
Q)

W

N

en

en

U)

i
c

r---------------------------------------------------------------------------------,
4.0 Functional Description
whether they are synchronous or asynchronous, high-priority asynchronous or low-priority asynchronous, whether their
address matches an internal (BMAC device) or external address, or the header and Information fields of all non-MACI
SMTframes.
The Synchronousl Asynchronous Sort Mode is Intended for
use in end-stations or applications using synchronous transmission.
With High-priority/Low-priority sorting, high-priority asynchronous frames are sorted onto Indicate Channel 1 and
low-priority asynchronous frames are sorted onto Indicate
Channel 2. The most-significant bit of the three-bit priority
field within the FC field determines the priority. This Mode Is
intended for end stations using two priority levels of asynchronous transmission.

The BSI device is composed of the Map Engine and Interfaces to the Control Bus (Control Bus Interface), the BMAC
device (BMAC Device Interface) and the ABus (Abus Interface).
In this section, the Map Engine is described in detail to provide an in-depth look at the operation of the BSI device.
4.1 OVERVIEW
The Map Engine consists of two major blocks, the Indicate
Machine and the Request Machine. These blocks share the
Bus Interface Unit, Status/Space Machine, Pointer RAM,
and Limit RAM blocks.
The Map Engine provides an interface between the BMAC
FDDI Protocol chip and a host system. The Map Engine
transfers FDDI frames (Service Data Units) between the
FDDI device and host memory.

With External/Internal sorting, frames matching the internal
address (In the BMAC device) are sorted onto Indicate
Channel 1 and frames matching an external address (when
the EA input is asserted) are sorted onto Indicate Channel
2. This mode is intended for bridges or ring monitors, which
would utilize the ECIP/EA/EM pins with external address
matching circuitry.

4.1.1 Indicate Machine
On the Receive side (from the ring) the Indicate Machine
sequences through the incoming byte stream from the
BMAC device. Received frames are sorted onto Indicate
Channels and a decision is made whether or not to copy
them to host memory. The Indicate Machine uses the control signals provided by the BMAC device Receive State
Machine on the MAC Indicate Interface.

The proper use of the ECIP, EA, and EM pins is as follows.
External address matching circuitry must assert ECIP somewhere from the assertion of FCRCVD (from the BMAC device) up to the clock cycle before the assertion of
INFORCVD (from the BMAC device). Otherwise, the BSI device assumes that no external address comparison is taking
place. ECIP must be negated for at least one cycle to complete the external comparison. If it has not been deasserted
before EDRCVD (from the BMAC device) the frame is not
copied. EA and EM are sampled on the clock cycle aiter
ECIP is negated. ECIP is ignored aiter it is negated until
FCRCVD is asserted again.
Note that this design allows ECIP to be a positive or negative pulse. To confirm frames in this mode, (typically with
Source Address Transparency enabled), EM must be asserted within the same timeframe as EA.
With the Headerllnfo Sort Mode, Indicate Channels 1 and 2
receive all non-MAC/SMT frames that are to be copied, but
between them split the frame header (whose length is userdefined) and the remaining portions of the frame (Info). Indicate Channel 1 copies the initial bytes up until the host-defined header length is reached. The remainder of the
frame's bytes are copied onto Indicate Channel 2. Only one
IDUD stream is produced (on Indicate Channel 1), but both
PSP Queues are used to determine where the IDUs will be
written. When a multi-part IDUD is produced, the Indicate
Status field is used to determine which parts point to the
header and which point to the Info. This Mode is intended
for high-performance protocol processing applications.
The Indicate Machine filters identical MAC and SMT frames
when the SKIP bit in the Indicate Mode Register is set, and
the Indicate Configuration Register's Copy Control field (2
bits) for Indicate Channel 0 is set to 01 or 10.

4.1.2 Request Machine
On the Transmit side (to the ring) the Request Machine prepares one or more frames from host memory for transmission to the BMAC device. The Request Machine provides all
the control signals to drive the BMAC device Request Interface.
4.2 OPERATION
4.2.1 Indicate Operation
The Indicate Block accepts data from the BMAC device as a
byte stream.
Upon receiving the data, the Indicate Block performs the
following functions:
• Decodes the Frame Control field to determine the frame
type
• Sorts the received frames onto Channels according to
the Sort Mode
• Filters identical MAC frames
• Copies the received frames to memory according to
Copy Criteria
• Writes status for the received frames to the Indicate
Status Queue
• Issues interrupts to the host on host-defined status
breakpoints
The Indicate Machine decodes the Frame Control (FC) field
to determine the type of frame. Ten types of frames are
recognized: Logical Link Control (LLC), Restricted Token,
Unrestricted Token, Reserved, Station Management (SMT),
SMT Next Station Addressing, MAC Beacon, MAC Claim,
Other MAC, and Implementer.
The Indicate Machine sorts incoming frames onto Indicate
Channels according to the frame's FC field, the state of the
AFLAG signal from ihe BMAC device, and the host-defined
sorting mode programmed in the Sort Mode field of the Indicate Mode Register. SMT and MAC Service Data Units
(SDUs) are always sorted onto Indicate Channel O. On Indicate Channels 1 and 2, frames can be sorted according to

Received frames are copied to memory based on the
AFLAG and MFLAG, ECIP, EA, and EM input signals from
external address matching logic, input signals from the
BMAC device, as well as the Indicate Channel's Copy Control field. Received frames are written as a series of Input
Data Units to the current Indicate page. Each frame is
aligned to the start of a currently-defined, burst-size memory
block (16 or 32 bytes as programmed in the Mode Register's SMLB bit). The first word contains the FC only, copied
2-268

4.0 Functional Description (Continued)
into all bytes of the first word written, with the DA, SA and
INFO fields aligned to the first byte of the next word. The
format differs according to the setting of the Mode Register's BIGEND (Big Endian) bit, as shown in Figure 4-1.
Byte 0
Bit 31

Byte 3
Bit 0

Big Endlan Indicate Data Unit Format

FC

FC

FC

FC

DAO

DAI

SAO

SAl

Byte 3
Bit 31

Breakpoint bits (Breakpoint on Burst End, Breakpoint on
Service Opportunity, and Breakpoint on Threshold) in the
Indicate Mode Register, and enabling the breakpoints to
generate an attention by setting the corresponding BreakpOint bit in the Indicate Notify Register.

Little Endlan Indicate Data Unit Format

When an Indicate exception occurs, the current frame is
marked complete, status is written into an lOUD. Last, and
the Channel's Exception (EXC) bit in the Indicate Attention
Register is set.
When an Indicate error (other than a parity error) is detected, the Channel's Error (ERR) bit in the State Attention Register is set. The host must reset the INSTOP Attention bit to
restart processing on the Indicate Channel.

Byte 0
Bit 0

FC

FC

FC

FC

SAl

SAO

DAI

DAO

When parity checking is enabled and a parity error is detected in a received frame, it is recorded in the Indicate Status
field of the lOUD, and the BMAC device Parity Error (PBE)
bit in the Status Attention Register is set.

FIGURE 4·1. Indicate Data Unit Formats
(Short Addresses)

4.2.2 Request Operation
The Request Block transmits frames from host memory to
the BMAC device. Data is presented to the BMAC device as
a byte stream.

For each Input Data Unit, the Indicate Machine creates an
Input Data Unit Descriptor (lOUD), which contains status information about the IOU, its size (byte count), and its location in memory. For IDUs that fit within the current Indicate
page, an IDUD.Only Descriptor is created. For IDUs that
span more than one page, a mUlti-part lOUD is created, i.e.,
when a frame crosses a page boundary, the BSI device
writes an IDUD.First; if another page is crossed, an
IDUD.Middle will be written; and at the frame end, an
IDUD.Last is written. IDUDs are written to consecutive loca·
tions in the Indicate Status Queue for the particular Indicate
Channel, up to the host-defined queue limit.

The Request Block performs the following functions:
• Prioritizes active requests to transmit frames
•
•
•
•

Requests the BMAC device to obtain a token
Transmits frames to the BMAC device
Writes status for transmitted and returning frames
Issues interrupts to the host on user-defined group
boundaries
The Request Machine processes requests by reading Request Descriptors from the REQ Queue, then assembling
frames of the specified service class, frame control and expected status for transmission to the BMAC device. Request and ODUD Descriptors are checked for consistency,
and the Request Class is checked for compatibility with the
current ring state. When an inconsistency or incompatibility
is detected, the request is aborted.
When a consistency failure occurs, the Request is terminated with appropriate status. The Request Machine then locates the end of the current object (REQ or ODUD). If the
current Descriptor is not the end (Last bit not set), the Request Machine will fetch subsequent Descriptors until it detects the end, then resume processing with the next Descriptor.First or Descriptor.Only.
Requests are processed on both Request Channels simultaneously. Their interaction is determined by their priorities
(Request Channel 0 has higher priority than Request Channell) and the Hold and Preempt/Prestage bits in the Request Channel's Request Configuration Register. An active
Request Channel 0 is always serviced first, and may be programmed to preempt Request Channel I, such that uncommitted Request Channell's data already in the request
FIFO will be purged and then refetched after servicing Request Channel o. When prestaging is enabled, the next
frame is staged before the token arrives. Prestaging is always enabled for Request Channel 0, and is a programmable option on Request Channell.
When a REQ.First is loaded, the Request Machine commands the BMAC device to capture a token of the type
specified in the REQ Descriptor, and concurrently fetches
the first ODUD. If prestaging is enabled, or a service opportunity exists for this Request Channel, data from the first

The Indicate Machine copies IDUs and IDUDs to memory as
long as there are no exceptions or errors, and the Channel
has data and status space. When a lack of either data or
status space is detected on a particular Channel, the Indicate Machine stops copying new frames for that Channel
(only). It will set the No Status Space attention bit in the No
Space Attention Register when it runs out of Status Space.
It will set the Low Data Space bit in the No Space Attention
Register when the last available PSP is prefetched from the
Indicate Channel PSP Queue. The host allocates more data
space by adding PSPs to the tail of the PSP Queue and then
updating the PSP Queue Limit Register, which causes the
BSI device to clear the Low Data Space attention bit and
resume copying (on the same Channel). The host allocates
more status space by updating the lOUD Queue Limit Register and then explicitly clearing the Channel's No Status
Space bit, after which the Indicate Machine resumes copying.
The BSI device provides the ability to group incoming
frames and then generate interrupts (via attentions) at
group boundaries. To group incoming frames, the BSI device defines status breakpoints, which identify the end of a
group (burst) of related frames. Status breakpoints can be
enabled to generate an attention.
The breakpoints for Indicate Channels are defined by the
host in the Indicate Mode, Indicate Notify, and Indicate
Threshold registers. Status breakpoints include Channel
change, receipt of a token, SA change, DA change, MAC
Info change, and the fact that a user-specified number of
frames have been copied on a particular Indicate Channel.
Status breakpoint generation may be individually enabled
for Indicate Channels 1 and 2 by setting the corresponding

2-269

4.0 Functional Description

(Continued)
ODU is loaded into the Request FIFO, and the BSI device
requests transmission from the BMAC device. When the
BMAC device has captured the appropriate token and the
frame is committed to transmission (the FIFO threshold has
been reached or the end of the frame is in the FIFO), transmission begins. The BSI device fetches the next ODUD and
starts loading the ODUs of the next frame into the FIFO.
This continues (across multiple service opportunities if required) until all frames for that Request have been transmitted (I.e., an REO.ONLY or an REO. LAST is detected), or an
exception or error occurs, which prematurely ends the Request.
The BSI device will load REO Descriptors as long as the
ROSTOP bit in the State Attention Register is Zero, the
REO Oueue contains valid entries (the REO Oueue Pointer
Register does not exceed the REO Oueue Limit Register),
and there is space in the CNF Oueue (the CNF Oueue
Pointer Register is less than the CNF Oueue Limit Register).

frames are ignored by the BSI device. The frame count ends
when any of the following conditions occur:
1. All the frames have been transmitted, and the transmitted
and confirmed frame counts are equal.
2. There is a MACRST (MAC Reset).
3. The state of the ring-operation has changed.
4. A stripped frame or a frame with a parity error is received.

5. A non-matching frame is received.
6. A token is received.
When Source Address Transparency is selected (by setting
the SAT bit in the Request Configuration Register) and Full
confirmation is enabled, confirmation begins when a frame
end is detected with either MFLAG or EM asserted.
When a non-matching frame is received, the BSI device
ends the Request, and generates the Request Complete
(RCM), Exception (EXC), and Breakpoint (BRK) attentions.
Any remaining REOs in the Request object are fetched until
a REO.Last or REO.Only is encountered. Processing then
resumes on the next REO.First or REO.Only (any other type
of REO would be a consistency failure).
Request errors and exceptions are reported in the State
Attention Register, Request Attention Register, and the
Confirmation Message Descriptor. When an exception or error occurs, the Request Machine generates a CNF and
ends the Request. The Unserviceable Request (USR) attention is set to block subsequent Requests once one becomes unserviceable.

Request status is generated as a single confirmation object
(single- or multi-part) per Request object, with each confirmation object consisting of one or more CNF Descriptors.
The type of confirmation is specified by the host in the Confirmation Class field of the REO Descriptor.
The BSI device can be programmed to generate CNF Descriptors at the end of the Request object (End Confirmation), or at the end of each token opportunity (Intermediate
Confirmation), as selected in the E and I bits of the Request
Class Field of the REO Descriptor. A CNF Descriptor is always written when an exception or error occurs (regardless
of the value in the Confirmation Class field), when a Request completes (for End or Intermediate Confirmation
Class), or when an enabled breakpoint occurs (Intermediate
Confirmation Class only).

4.2.3 State Machines
There are three state machines under control of the host:
the Request Machine, the Indicate Machine, and the
Status/Space Machine. Each Machine has two Modes:
Stop and Run. The Mode is determined by the setting of the
Machine's corresponding STOP bit in the State Attention
Register. The STOP bits are set by the BSI device when an
error occurs or may be set by the user to place the Machine
in Stop Mode.
The BSI Control Registers may be programmed only when
all Machines are in Stop Mode. When the Status/Space
Machine is in Stop Mode, only the Pointer RAM and Limit
RAM Registers may be programmed.
When the Indicate and Request Machines are in Stop
Mode, all indicate and request operations are halted. When
the Status/Space Machine is in Stop Mode, only the PTOP
and LMOP service functions can be performed.

There are three basic types of confirmation: Transmitter,
Full, and None. With Transmitter Confirmation, the BSI device verifies that the Output Data Units were successfully
transmitted. With Full Confirmation, the Request Machine
verifies that the ODUs were successfully transmitted, that
the number of (returning) frames "matches" the number of
transmitted ODUs, and that the returning frames contain the
expected status. When the None Confirmation Class is selected, confirmation is written only if an exception or error
occurs.
For Full Confirmation, a matching frame must meet the following criteria:
1. The frame has a valid Ending Delimiter (ED).
2. The selected bits in the FC fields of the transmitted and
received frames are equal (the selected bits are specified
in the FCT bit of the Request Configuration Register).
3. The frame is My_SA (MFLAG or both SAT & EM asserted).
4. The frame matches the values in the Expected Frame
Status Register.

4.3 BUS INTERFACE UNIT
4.3.1 Overview
The ABus provides a 32-bit wide synchronous multiplexed
address/data bus for transfers between the host system
and the BSI device. The ABus uses a bus request/bus grant
protocol that allows multiple bus masters, supports burst
transfers of 16 and 32 bytes, and supports virtual and physical addressing using fixed-size pages. The BSI is capable of
operating directly on the system bus to main memory, or
connected to external shared memory.

5. FCS checking is disabled or FCS checking is enabled and
.
the frame has a valid FCS.
6. All bytes from FC to ED have good parity (when the
FLOW bit in the Mode Register is set, i.e., parity checking
is enabled).
The confirmed frame count starts after the first Request
burst frame has been committed by the BMAC device, and
when a frame with MY_SA is received. Void and My_Void

All bus signals are synchronized to the master bus clock.
The maximum burst speed is one, 32-bit word per clock, but
slower speeds may be accommodated by inserting wait
states. The user may use separate clocks for the ring (FDDI
MAC) and system (ABus) interfaces. The only restriction is
that the ABus clock must be at least as fast as the ring clock

2-270

C

"U

4.0 Functional Description

01)
Co)

(Continued)
(lBC). It is important to note that all ABus outputs change
and all ABus inputs are sampled on the rising edge of
AB_ClK.

Burst transfers are always word-aligned on a 16- or 32-by1e
(burst-size) address boundary. Burst transfers will never
cross a burst-size boundary. If a 32-by1e transfer size is chosen, the BSI device will perform both 16-by1e and 32-by1e
bursts, whichever is most efficient (least number of clocks
to load/store all required data).
The Bus Interface Unit can operate in either Big Endian or
Little Endian Mode. The bit and by1e alignments for both
modes are shown in Figure 4-2. Byte 0 is the first by1e received from the ring or transmitted to the ring.

Addressing Modes
The Bus Interface Unit has two Address Modes, as selected
by the user: Physical Address Mode and Virtual Address
Mode. In Physical Address Mode, the BSI device emits the
memory address and immediately begins transferring the
data. In Virtual Address Mode, the BSI device inserts two
clock cycles and TRI-STATE™s the address between emitting the virtual address and starting to transfer the data. This
allows virtual-to-physical address translation by an external
MMU.

N

en

U1

Bus Arbitration
The ABus is a multi-master bus, using a simple Bus Request/Bus Grant protocol that allows an external Bus Arbiter to support any number of bus masters, using any arbitration scheme (e.g., rotating or fixed priority). The protocol
provides for multiple transactions per tenure, and bus master preemption.
The BSI device asserts a Bus Request, and assumes mastership when Bus Grant is asserted. If the BSI device has
another transaction pending, it will keep Bus Request asserted, or reassert it before the completion of the current
transaction. If Bus Grant is (re)asserted before the end of
the current transaction, the BSI device retains mastership
and runs the next transaction. This process may be repeated indefinitely.

The BSI device interfaces to byte-addressable memory, but
always transfers information in words. The BSI device uses
a word width of 32 data bits plus 4 (1 per byte) parity bits.
Parity may be ignored.
Bus Transfers
The bus supports several types of transactions. Simple
reads and writes involve a single address and data transfer.
Burst reads and writes involve a single address transfer followed by multiple data transfers. The BSI device provides
the incrementing address bits during the burst transaction.
Burst sizes are selected dynamically by the BSI.
On Indicate Channels, when 8-word bursts are enabled, all
transactions will be 8 words until the end of the frame; the
last transfer will be 4 or 8 words, depending on the number
of remaining by1es. If only 4-word bursts are allowed, all
Indicate Data transfers are 4 words.
On Request Channels, the BSI will use 4- or 8-word bursts
to access all data up to the end of the ODU. If 8-word bursts
are enabled, the first access will be an 8-word burst if the
ODU begins less than 4 words from the start of an 8-word
burst boundary. If 8-word bursts are not allowed, or if the
ODU begins 4 or more words from the start of an 8-word
burst boundary, a 4-word burst will be used. The BSI will
ignore unused bytes if the ODU does not start on a burst
boundary. At the end of an ODU, the BSI will use the smallest transfer size (1, 4, or 8 words) which completes the ODU
read. To coexist in a system that assumes implicit wraparound for the addresses within a burst, the BSI device never emits a burst that will wrap the 4- or 8-word boundary.

If the Bus Arbiter wishes to preempt the BSI device, it deasserts Bus Grant. The BSI device will complete the current
bus transaction, then release the bus. From preemption to
bus release is a maximum of (11 bus clocks + (8 times the
number of memory wait states» bus clocks. For example, in
a 1 wait-state system, the BSI device will release the bus
within a maximum of 19 bus clocks.
Big-Endian Byte Order

0[31]

0[0]
Word

HalfwordO
By1eO

I

By1e1

I
I

Halfword 1
By1e2

I

By1e3

llttle-Endian Byte Order

0[31]

A Function Code identifying the type of transaction is output
by the BSI device on the upper four address bits during the
address phase of a data transfer. This can be used for more
elaborate external addressing schemes, for example, to direct control information to one memory and data to another
(e.g., an external FIFO). To assist the user with the burst
transfer capability, the BSI device also outputs three demultiplexed address bits during a burst transfer. These indicate
the next word within a burst to be accessed.

0[0]
Word

Halfword 1
By1e3

I

By1e2

I
I

HalfwordO
Byte 1

I

By1eO

FIGURE 4-2. ABus Byte Orders
Parity
There are two options for parity: one for systems using parity, the other for systems not using parity. Parity checking on
the ABus can be disabled by clearing the FLOW bit in the
Mode Register. When parity is enabled (FLOW bit is set), it
operates in flow-through mode on the main datapath, that
is, parity is not checked at the ABus but simply flows between the ABus and the BMAC device interface, and is
checked by the BMAC device as it is received. When the
FLOW bit is set, parity checking is also enabled on the Control Bus and MAC Indicate Interfaces.
The BSI device generates parity on all addresses output on
the ABus.

Byte Ordering
The basic addressable quantum is a byte, so request data
may be aligned to any by1e boundary in memory. All information is accessed in 32-bit words, however, so the BSI
device ignores unused bytes when reading.
Descriptors must always be aligned to a word address
boundary. Input Data Units are always aligned to a burstsize boundary. Output Data Units may be any number of
by1es, aligned to any by1e-address boundary, but operate
most efficiently when aligned to a burst-size boundary.

2-271

fII

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,

~

CO)

~

c

4.0 Functional Description (Continued)
Bandwidth
The ABus supports single reads and writes, and burst reads
and writes. With physical addressing, back-to-back single
reads/writes can take place every four clock cycles. Burst
transactions can transfer 8, 32·bit words (32 bytes) every 11
clock cycles. With a 25 MHz clock this yields a peak bandwidth of 72.7 Mbytes/sec.

two Burst FIFOs, each containing two banks of 32 bytes,
which provide ABus bursting capability.
The amount of latency covered by the Data FIFO plus one
of the banks of the Burst FIFO must meet the average and
maximum bus latency of the external memory. With a new
byte every 80 ns from the ring, a 64-byte FIFO provides
64 x 80 = 5.12,..s maximum latency.
To assist latency issues, the BSI device can completely
empty or fill the Burst FIFO in one bus tenure by asserting
Bus Request for multiple transactions. Since one bank of
the Burst FIFO is 8 words deep, if 8-word bursts are enabled, that half of the Burst FIFO can be emptied in one
transaction. If the second half of the burst FIFO is also full, it
can be emptied in the same bus tenure by again granting
the bus to the BSI device.
The BSI device may be preempted at any time by removing
Bus Grant, which causes the BSI device to complete the
current transaction and release the bus. There will be a
maximum of 11 clocks (plus any memory wait states) from
preemption to bus release (fewer if 8-word bursts are not
enabled).

To allow the bus to operate at high frequency, the protocol
defines all signals to be both asserted and deasserted by
the bus master and slaves. Having a bus device actively
deassert a signal guarantees a high-speed inactive transition. If this were not defined, external pull-up resistors
would not be able to deassert signals fast enough. The protocol also reduces contention by avoiding cases where two
bus devices simultaneously drive the same line.
The BSI device operates synchronously with the ABus
clock. In general, operations will be asynchronous to the
ring, since most applications will use a system bus clock
that is asynchronous to the ring. The BSI device is designed
to interface either directly to the host's main system bus or
to external shared memory. When interfaced to the host's
bus, there are two parameters of critical interest: latency
and bandwidth.

4.3.2 Bus Ststes
An ABus Master has eight states: idle (Ti), bus request
(Tbr), virtual address (Tva), MMU translate (Tmmu), physical
address (Tpa) , data transfer (Td), wait (Tw) and recovery
(Tr). The ABus Master state diagram is shown In Figure 4-3.
An ABus Slave has five states: idie (Ti), selected (Ts), data
transfer (Td), wait (Tw), and recovery (Tr).

Data moves between the Request and Indicate Channels
and the ABus via four FIFOs, two in the receive path (Indicate) and two in the transmit path (Request). On the BMAC
Device Interface, there are two, 16 x 32 bit data FIFOs for
Indicate and Request data. On the ABus Interface, there are

2-272

01:0.

BO:Ti

--.-(00)

Bl:Tbr
!rqst

]

B2:Tpo

rqst

(01)

AB_BR;ociLrqst

~I (23b)

ABiiG &; imode.VIRT
AB-AS;AB_SIZO;AB-AO;AB-AD(Addr);

(12)

--.-

-

I

e!..

B3:Td

--.-(23a)

iAB_BG
(11)-=
AB_BR

bursLend

AB-DEN;iAB-AS;losLdoto;AB-AD(doto)
!bursLend
AB_DEN;AB-AD(doto)

-+
~

II(read)AB_R/W=I;else AB_R/W=O

AB_BG

&;

mode.VIRT

B5:Tvo

B6:Tmmu

-.-

-,-

(15)

~I

(62)

AB-AS;AB_SIZO;AB-AO;A8-AD(Addr );
II(reod)A8_R/W=I;else ALR/W=O

(56)

TRISTATE

AB-ACK

&;

bursLend

&;

!losLdota

10sLdato;iAB-AS

---+

(330)

AiLACK &: !bursLend &: !lasLdata

~I

I

(33b)

nexLdata

(AB-AD)
85:Tr

(:)
."
c::::
:::J

n

0"
:::J

cCD

en
.,n
-6"

c)"
:::J

'§
a
5'
t:

B4:Tw

(D

.90

14

'".....

'"'"

14

rqst
ockJqst

iAiLACK

-.(51)

ilosLdoto

(50)

'AB-ACK &; bursLend
•
!AB-AS;losLdoto

(44a)

I
!A8-ACK

irqst
TRISTATE(oU outputs)

&;

~

&;

10sLdoto

(44b)

iAB-ACK

14

&;

(340)

ibursLend

)
(34b

!A8-AS;losLdoto
(43a)

A8-ACK

&;

bursLend

&;

ilosLdoto

!AB-AS;losLdoto

14

A8-ACK

&;

10sLdota
(45)

1

4

AB-ACK
(43b)

Negote(AB_SIZO.A8_R/W.AB_DEN);
TRISTATE(AB-AS)
AB-ACK

&;

lasLdoto

&;

!bursLend

nexLdata

~I

(35)

Negate(AB_SIZO.AB_R/W.A8-DEN); TRISTATE(A8-AS)
TUF/l0791-6

Note 1: If (AB-AGK) nexLdata decrements bursLcQunt, processes data.
Note 2: BursLcount is pipelined 1 ahead, so is true in last Td state.

Note 3: II (AB-ACK) lasLdata negates AB-AS. processes data.
Note 4: Timing for AB_BR not shown.

FIGURE 4-3. BSI Device ABus Master State Machine (from the BSI Device)

S9l!£8dO

II

~

CD

,-------------------------------------------------------------------------,

~

4.0 Functional Description (Continued)

a.

Master States
The Ti state exists when no bus activity is required. The BIU
does not drive any of the bus signals when it is in this state
(all are released). If the BIU requires bus service, it may
assert Bus Request.
When a transaction is run, the BIU enters Tbr and asserts
Bus Request, then waits for Bus Grant to be asserted.

CD

Q

cle). If the slave can drive data at the rate of one word per
clock (in a burst), it keeps ABJCK asserted.
Following the final Td/Tw state, the BIU enters a Tr state to
allow time to turn off or turn around bus transceivers.
A bus retry request is recognized in any Td/Tw state. The
BIU will go to a Tr state and then rerun the transaction when
it obtains a new Bus Grant. The whole transaction is retried,
i.e., all words of a burst. Additionally, no other transaction
will be attempted before the interrupted one is retried. The
BIU retries indefinitely until either the transaction completes
successfully, or a bus error is signaled.

The state following Tbr is either Tva or Tpa. In Virtual Address Mode, the BIU enters Tva and drives the virtual address and size lines onto the bus. In Physical Address
Mode, Tpa occurs next (see Section 4.3.3).
Following a Tva state is a Tmmu state. During this cycle the
external MMU is performing a translation of the virtual address emitted during Tva.

Bus errors are recognized in Td/Tw states.

4.3.3 Physical Addressing Bus Transactions
Bus transactions in Physical Address Mode are shown in
Figure 4-4 through 4-7. BSI device signals are defined in
Chapter 6.

Following a Tmmu state (when using virtual addressing) or a
Tbr state (when using physical addressing), is the Tpa state.
During the Tpa state, the BSI device drives the read/write
strobes and size signals. In physical address mode, it also
drives ABJD with address. In virtual address mode, the
BSI device TRI-STATEs AB_BD so the host CPU or MMU
can drive the address.

Single Read
Tbr:
BSI device asserts AB_BA to indicate it wishes to
perform a transler. Host asserts AB_BG. Moves to
Tpa on the next clock.
BSI device drives ABJ and ABJD with the adTpa:
dress, asserts ABJS, drives AB~W and
AB_SIZ[2:0], negates AB_BR if another transaction is not required.

Following the Tpa state, the BIU enters the Td state to
transfer data words. Each data transfer may be extended
indefinitely by inserting Tw states. A slave acknowledges by
asserting ABJCK and transferring data in a Td state (cylbr

AB~R

~~~

lbr

Tpa

Tr

Td

______~~~

F%a~A_

lbr

--------------~~a-

-

A1LRW

address

______~'b_~~----~~~~__________~~_-------

BSI addr

AB-AD(31:0)

Tr

Tw

Td

______________________________________

address

AB-A(4:2)

Tpa

Slave data

BSI data

~

>?< >;>~------~;>---------

t2221

'2223

12,,3
P221

F%a

IZZZ3...--

WI

IZZZ3...--

V,)]

Master B - - - -..

TUF/l0791-7

FIGURE 4·4. ABus Single Read, Physical Addressing, 0 W-S, 1 W-S, Bus Handover

2·274

4.0 Functional Description
Td:

Tr:

(Continued)

BSI device negates ABJS, asserts AB_DEN,
samples ABJCK and AB_ERR. Slave asserts
ABJCK, drives AB_ERR, drives ABJD (with
data) when ready. The BSI device samples a valid
ABJCK, capturing the read data. Tw states may
occur after Td.
BSI
device
negates
AB_RW,
AB_DEN,
AB_SIZ[2:01. releases ABJ, and ABJS. Slave
deasserts ABJCK and AB_ERR, releases
ABJD

Tpa: BSI device drives ABJ and ABJD with the ad-

Td:

Tr:

Single Write

Tbr:

BSI device asserts AB_BR to indicate it wishes to
perform a transfer. Host asserts AB_BG. Moves to
Tpa on the next clock.
Tbr

Tbr

Tpa

Td

Tr

Tbr

dress, asserts ABJS, drives AB_RW and
AB_SIZ[2:01. and negates AB_BR if another transaction is not required.
BSI device negates ABJS, asserts AB_DEN,
drives ABJD with the write data and starts sampling ABJCK and AB_ERR. Slave captures
ABJD data, asserts ABJCK, drives AB_ERR.
Tw states may occur after Td if the slave deasserts
ABJCK.
BSI
device
negates
AB_RW,
AB_DEN,
AB_SIZ[2:01, releases ABJ, ABJD, ABJS.
Slave deasserts ABJCK and AB_ERR, and stops
driving ABJD with data.
Tpa

----------~~~

____~»u~------0g~__________~»~~~-----

BSI addr
AB..AD(31 :0)

Tr

address

address

AB..A(4:2)

Tw

Td

BSI data

BSI addr

0g

}'?(

};;>

(2223

®

')<2)

BSI data

«Z2)

1/2;3

1/223

M

'2223

23

M

.2223

2a

Master B
TL/F/l0791-B

FIGURE 4-5. ABus Single Write, Physical Addressing, a W-S, 1 W-S, Bus Handover

2-275

fII

4.0 Functional Description

(Continued)

Td:

Burst Read
Tbr: BSI device asserts AB_BR to indicate it wishes to
perform a transfer. Host asserts AB_BG. Moves to
Tpa on the next clock.
Tpa: BSI device drives ABJ and ABJD with the address, asserts ABJS, drives AB_RW and
AB_SIZ[2:0], and negates AB_BR if another transaction is not required.

AB~R

~~~______~~~

~~~________________________________________

•

addre •• (n)

AB..A{4:2)

addre •• (n + I)

addro •• (n + 2)

addr... (n + 3)

addre .. (n)

_____*£".aill....____..*r.:2i_____*I2!l...____....»,~~

--------~"'~_ _MiIE~
BSI addr

AB..AD{31:0)

Tr:

BSI device asserts AB_DEN, samples AECACK
and AB_ERR, increments the address on ABJ.
Slave asserts ABJCK, drives AB_ERR, and
drives ABJD (with data) when ready. BSI device
samples a valid ABJCK, capturing the read data.
Tw states may occur after Td. Td state is repeated
four or eight times (according to the burst size). On
the last Td state, the BSI device negates AB.::AS.
BSI
device
negates
AB_RW,
AB_DEN,
AB_SIZ[2:0], and releases ABJ and ABJS.
Slave deasserts ABJCK and AB_ERR, and releases ABJD.

Slave data{n)

-----------¢(

Slave dat.{n+l)

»----« »--

Siavo dat.{n+2)

»>---« »>---«

_____________~~_____I~~
--------,~ZZL_
««1
~

Siavo data{n+3)

1222J
-----

12 223
AB-SIZ{2:0)

________

~~,.~~--------------------------.~~ft--

AB~EN -------------------~ZL

12223

__________________________________________

r

AB..ACK _______________.....JtlZ?4

--,LW.!

~

f@

~

I~~

~

~~.,."..--r...
It?.,.,~""~---'rmr-"""
TL/F110791-9

FIGURE 4·6. ABus Burst Read, Physical Addressing, 16 Bytes, 1 W-S

2·276

C

"tI

4.0 Functional Description (Continued)

Q)
Co)

Td:

Burst Write
Tbr: BSI device asserts AB_BR to indicate it wishes to
perform a transfer. Host asserts AB_BG. Moves to
Tpa on the next clock.
Tpa: BSI device drives ABJ and ABJD with the address, asserts ABJS, drives AB_RW and
AB_SIZ[2:01, and negates AB_BR if another transaction is not required.

AO~R

~~~______~~~

•a

~~~__________________________________________

addre •• (n + 1)

addre .. ?<

addre •• (n + 2)

OSI data (n + 1)

OSI data (n)

OSI addr

>?<

address (n + 3)

>?<

>?<
>?<

address (n)

>?<
OSI data (n + 2)

>?<

OSI dota (n + 3)

>?<
f@I

»-»--

P2?d

AO...AS

t2223

AO_RW

12223

w.r

®

~

AO_SIZ(2:0)

AD_DEN

AO...ACK

wa-

12223
f221

L.W.I E%I f%I

~

~

VAl rmrTLlF/l0791-10

FIGURE 4-7. ABus Burst Write, Physical Addressing, 16 Bytes 1 W-S

2-277

N

en

UI

4.0 Functional Description

(Continued)

4.3.4 Virtual Addressing Bus Transactions

Burst Read
BSI device asserts AB_BR to indicate it wishes to
Tbr:
perform a transfer. Host asserts AB_BG, BSI
drives ABJ and ABJD when AB_BG is asserted. Moves to Tva on the next clock.
Tva: BSI device drives ABJ and ABJD with the virtual address for one clock, negates ABJS, asserts
AB_RW, drives AB_SIZ[2:0], and negates
AB_BR if another transaction is not required.
Tmmu: Host MMU performs an address translation during
this clock.
Tpa: Host MMU drives ABJD with the translated (physical) address. BSI device drives ABJ and asserts
ABJS.
Td:
BSI device asserts AB_DEN, samples ABJCK
and AB_ERR. Slave asserts ABJCK, drives
AB_ERR, drives ABJD (with data) when ready.
BSI device samples a valid ABJCK, capturing the
read data. Tw states may occur after Td. This state
is repeated four or eight times (according to burst
size). On the last Td state the BSI device negates
ABJS.
BSI device negates AB_RW,
AB_DEN,
Tr:
AB_SIZ[2:01, releases ABJ and ABJS. Slave
deasserts ABJCK and AB_ERR, and releases
ABJD.

Single Read
BSI device asserts AB_BR to indicate it wishes to
Tbr:
perform a transfer. Host asserts AB_BG, and B~I
device drives ABJ and ABJD when AB_BG IS
asserted. Moves to Tva on the next clock.
Tva: BSI device drives ABJ and ABJD with the virtual address for one clock, negates ABJS, asserts
AB_RW, drives AB_SIZ[2:01, and negates
AB_BR if another transaction is not required.
Tmmu: Host MMU performs an address translation during
this clock.
Tpa: Host MMU drives ABJD with the translated (physical) address, BSI device drives ABJ and asserts
ABJS.
Td:
BSI device negates AB::AS, asserts AB_DEN,
samples ABJCK and AB_ERR. Slave asserts
ABJCK, drives AB_ERR, drives ABJD (with
data) when ready. BSI device samples a valid
ABJCK, capturing the read data. Tw states may
occur after Td.
Tr:
BSI device negates AB_RW, AB_DEN, and
AB_SIZ[2:01, releases ABJ and ABJS. Slave
deasserts ABJCK and AB_ERR and releases
ABJD.
Single Write
BSI device asserts AB_BR to indicate it wishes to
Tbr:
perform a transfer. Host asserts AB_BG, BSI d~.
vice drives ABJ and ABJD when AB_BG IS
asserted. Moves to Tva on the next clock.
Tva: BSI device drives ABJ and ABJD with the virtual address for one clock, negates ABJS, negates
AB_RW, and drives AB_SIZ[2:0].
Tmmu: Host MMU performs an address translation during
this clock.
Tpa: Host MMU drives ABJD with the address, BSI device drives ABJ asserts ABJS, and negates
AB_BR if another transaction is not required.
Td:
BSI device negates ABJS, asserts AB_DEN,
drives ABJD with the write data and starts sampling ABJCK and AB_ERR. Slave captures
ABJD data, asserts ABJCK, and drives
AB_ERR.
BSI device samples a valid
ABJCK. Tw states may occur after Td.
Tr:
BSI device negates AB_RW, "'"A=B_--":D""EN"',
AB SIZ[2:01, releases ABJ, ABJD, and
ABJS. Slave deasserts ABJCK and
AB_ERR, and stops driving ABJD with data.

Burst Write
Tbr:
BSI device asserts AB_BR to indicate it wishes to
perform a transfer. Host asserts AB_BG, BSI d~­
vice drives ABJ and ABJD when AB_BG IS
asserted. Moves to Tva on the next clock.
Tva: BSI device drives ABJ and ABJD with the virtual address for one clock, negates ABJS, negates
AB_RW, drives AB_SIZ[2:0].
Tmmu: Host MMU performs an address translation during
this clock.
Tpa: Host MMU drives ABJD with the address, BSI device drives ABJ asserts ABJS, and negates
AB_BR if another transaction is not required.
Td:
BSI device asserts AB_DEN, drives ABJD with
the write data and starts sampling ABJCK and
AB_ERR. Slave captures ABJD data, asserts
ABJCK and drives AB_ERR. BSI device samples a valid ABJCK. Tw states may occur after
Td. This state is repeated as required for the complete burst. On the last Td state, the BSI device
negates ABJS.
Tr:
BSI
device negates AB_RW,
AB_DEN,
AB_SIZ[2:01, releases ABJ, ABJD, ABJS.
Slave deasserts ABJCK and AB_ERR, stops
driving ABJD with data.

2-278

5.0 Control Information
5.1 OVERVIEW
Control information includes the parameters that are used
to manage and operate the BSI device.
Control information is divided into four basic groups: Opera·
tion Registers, Pointer RAM Registers, Limit RAM Regis·
ters, and Descriptors. The Control information Register Ad·
dress Space is shown in Table 5·1.
Operation registers are accessed directly via the Control
Bus. Limit RAM Registers are accessed indirectly via the
Control Bus, using the Limit RAM Data and Limit RAM Ad·
dress Registers. The Pointer RAM Registers are accessed
indirectly via the Control Bus and ABus using the Pointer
RAM Address and Control Register, the Mailbox Address
Register, and a mailbox location in ABus memory.

• Limit Address Register (LAR) is used to program the
parameters and data used in the LMOP (Limit RAM Op·
eration) service function.
• Limit Data Register (LOR) is used to program the data
used in the LMOP service function.
o Request Channel 0 Configuration Register (ROCR) is
used to program the operational parameters for Request
ChannelO.
o Request Channel 1 Configuration Register (R1CR) is
used to program the operational parameters for Request
Channell.
• Request Channel 0 Expected Frame Status Register
(ROEFSR) defines the expected frame status for frames
being confirmed on Request Channel O.
o Request Channel 1 Expected Frame Status Register
(R1EFSR) defines the expected frame status for frames
being confirmed on Request Channell.
o Indicate Threshold Register (ITR) is used to specify a
maximum number of frames that can be copied onto an
Indicate Channel before a breakpoint is generated.

5.2 OPERATION REGISTERS
The Operation Registers are divided into two functional
groups: Control Registers and Event Registers. They are
shown in Table 5·2.
Control Registers
The Control Registers are used to configure and control the
operation of the BSI device.

o Indicate Mode Register (IMR) specifies how the incom-

ing frames are sorted onto Indicate Channels, enables
frame filtering, and enables breakpoints on various burst
boundaries.
o Indicate Configuration Register (ICR) is used to program the copy criteria for each of the Indicate Channels.

The Control Registers include the following registers:
• Mode Register (MR) establishes major operating pa·
rameters for the BSI device.
• Pointer RAM Control and Address Register (PCAR) is
used to program the parameters for the PTOP (Pointer
RAM Operation) service function.

• Indicate Header Length Register (IHLR) defines the
length of the frame header for use with the Header/Info
Sort Mode.

• Mailbox Address Register (MBAR) is used to program
the memory address of the mailbox used in the data
transfer of the PTOP service function.

Table 5.1 Control Register Address Space
Address
Range

Description

Read
Conditions

Write
Conditions

00-IFh
00-15h*
0-9h*'

Operation Registers
Pointer RAM Registers
Limit RAM Registers

Always
Always
Always

Always (Conditional)
Always
Always

'Bits 0-4 of Pointer RAM Address and Control Register
"Bits 4-7 of Limit RAM Address Register

2-279

5.0 Control Information (Continued)
TABLE 5-2. Control and Event Registers
Register
Group

Address

Access Rules

Register Name

Write

Read

C

00

Mode Register (MR)

Always

C

01

Reserved

N/A

Always
N/A

C

02

Pointer RAM Control and Address Register (PCAR)

Always

Always

C

Always

03

Mailbox Address Register (M8AR)

Always

E

04

Master Attention Register (MAR)

Always

Data Ignored

E

05

Master Notify Register (MNR)

Always

Always

E

06

State Attention Register (STAR)

Always

Conditional

E

07

State Notify Register (STNR)

Always

Always

E

08

Service Attention Register (SAR)

Always

Conditional

E

09

Service Notify Register (SNR)

Always

Always

E

OA

No Space Attention Register (NSAR)

Always

Conditional

E

08

No Space Notify Register (NSNR)

Always

Always

C

OC

Limit Address Register (LAR)

Always

Always

C

OD

Limit Data Register (LDR)

Always

Always

E

OE

Request Atlention Register (RAR)

Always

Conditional

E

OF

Request Notify Register (RNR)

Always

Always

C

10

Request Channel 0 Configuration Register (ROCR)

Always

Always

C

11

Request Channel 1 Configuration Register (R1 CR)

Always

Always

C

12

Request Channel 0 Expected Frame Status Register (ROEFSR)

Always

Always

C

13

Request Channel 1 Expected Frame Status Register (R1 EFSR)

Always

Always

E

14

Indicate Atlention Register (IAR)

Always

Conditional

E

15

Indicate Notify Register (INR)

Always

Always

C

16

Indicate Threshold Register (ITR)

Always

INSTOP Mode
or EXC = 1 Only

C

17

Indicate Mode Register (lMR)

Always

INSTOPMode
Only

C

18

Indicate Configuration Register (ICR)

Always

Always

C

19

Indicate Header Length Register (IHLR)

Always

INSTOPMode
or EXC = 1 Only

1A-C
E

1F

Reserved

N/A

N/A

Compare Register (CMP)

Always

Always

C - Control Register
E = Event Register

2-280

5.0 Control Information (Continued)
TABLE 5·3. Control and Event Registers Following Reset

Address

Register

00

Mode Register

00

02

Pointer RAM Control and Address Register

NA

03

Mailbox Address Register

04

Master Attention Register

00

05

Master Notify Registers

00

.

06

State Attention Register

07

07

State Notify Register

00

08

Service Attention Register

OF

09

Service Notify Register

00

OA

No Space Attention Register

FF

OB

No Space Notify Register

00

OC

Limit Address Register

NA

00

Limit Data Register

NA

OE

Request Attention Register

00

OF

Request Notify Register

00

10

Request Channel 0 Configuration Register

NA

11

Request Channell Configuration Register

NA

12

Request Channel 0 Expected Frame Status Register

NA

13

Request Channell Expected Frame Status Register

NA

14

Indicate Attention Register

00

15

Indicate Notify Register

00

16

Indicate Threshold Register

NA

17

Indicate Mode Register

NA

18

Indicate Configuration Register

NA

19

Indicate Header Length Register

NA

lF

Compare Register

NA

• = Initialized to a silicon Revision code upon reset. The Revision code remains until it is overwritten by the host.

NA

Reset

= Not altered upon reset.

2·281

U)

CD
C\I

C")

~

c

r---------------------------------------------------------------------------------,
5.0 Control Information (Continued)
Event Registers
The Event Registers record the occurrence of events or series of events. Events are recorded and contribute to generating the
Interrupt signal. There is a two-level hierarchy in generating this signal, as shown in Figure 5-1.
At the first level of the hierarchy, events are recorded as bits in the Attention Registers (e.g., No Space Attention Register). Each
Attention Register has a corresponding Notify Register (e.g., No Space Notify Register). When a bit in the Attention Register is
set to One and its corresponding bit in the Notify Register is also set to One, the corresponding bit in the Master Attention
Register will be set to one.
At the second level of the hierarchy, if a bit in the Master Attention Register is set to One and the corresponding bit in the Master
Notify Register is set to One, the Interrupt signal is asserted.
Bits in Conditional Write Registers (e.g., No Space Attention Register) are only written when the corresponding bits in the
Compare Register are equal to the bits to be overwritten.

TL/F/10791-11

FIGURE 5-1. Event Registers Hierarchy
Events are recorded in Attention Registers and contribute to
the Interrupt when the bit in the corresponding Notify Register is set (see Table 5-2).

• Service Notify Register (SNR) is used to enable attentions in the Service Attention Register.
• No Space Attention Register (NSAR) presents attentions generated when the lOUD, PSP, or CNF Queues
run out of space or valid entries.

The Event Registers include the following registers:
• Master Attention Register (MAR) collects enabled attentions from the State Attention Register, Service Attention Register, No Space Attention Register, Request Attention Register, and Indicate Attention Register.

• Request Attention Register (RAR) presents attentions
generated by both Request Channels.
• Request Notify Register (RNR) is used to enable attentions in the Request Attention Register.

• Master Notify Register (NMR) is used to selectively enable attention in the Master Attention Register.

• Indicate Attention Register (IAR) presents the attentions generated by the Indicate Channels.

• State Attention Register (STAR) presents attentions
for major states within the BSI device and various error
conditions.

• Indicate Notify Register (INR) is used to enable attentions in the Indicate Attention Register.

• State Notify Register (STNR) is used to enable attentions in the State Attention Register.

• Compare Register (CMP) is used for comparison with a
write access of a conditional write (Attention) register.

• Service Attention Register (SAR) presents attentions
for the PTOP and LMOP service functions.

2-282

5.0 Control Information

(Continued)

5.3 CONTROL AND EVENT REGISTER DESCRIPTIONS
Mode Register (MR)
The Mode Register (MR) is used to program the major operating parameters for the BSI device. This register should be
programmed only at power-on, or after a software Master Reset.
This register is cleared upon reset.
Access Rules
Address

I

Read

I

OOh

Write

I

Always

Always

I

Register Bits
D7

I

SMLB

D6

I

SMLQ

D5

I

VIRT

D4

I

BIGEND

D3

I

FLOW

Dl

D2

I

MRST

I

FABCLK

DO

I

TEST

I

Description .

Bit

Symbol

DO

TEST

Test Mode: Enables test logic, in which the transmitted frames counter will cause a
service loss after four frames, instead of 255 frames.

Dl

FABCLK

Fast ABus Clock: Determines the metastability delay period for synchronizing between
the ABus clock and the Ring clock (LBC). Upon reset this bit is cleared to Zero, which
selects one ABus clock period as the delay. When this bit is set to One, only % of an ABus
clock delay is used. When AB_CLK = LBC, (i.e., at 12.5 MHz and in phase), this bit
should be set. For any AB_CLK greater then LBC, this bit must be Zero.

D2

MRST

Master Reset: When this bit is set, the Indicate, Request, and Status/Space Macines are
placed in Stop Mode,and BSI device registers are initialized to the values shown in Table
5-5. This bit is cleared after the reset is complete.

D3

FLOW

Flow Parity: When this bit is set, parity flows between the ABus and the BMAC device,
that is, incoming data is not checked at the ABus interface, but is Checked (by the BMAC
device) as it is passed to the BMAC device. The parity check includes the frame's FC
through ED fields. When this bit is set, Control Bus parity is also checked, and errors are
reported in the CPE bit of the State Attention Register. When this bit is Zero, no parity is
checked on the Control Bus or ABus.

D4

BIGEND

Big Endlan Data Format: Selects between the Little Endian (BIG END = 0) or Big Endian
(BIGEND = 1) data format. See Figure 4-2.

D5

VIRT

Virtual Address Mode: Selects between virtual (VIRT = 1) or physical (VIRT = 0)
address mode on the ABus.

D6

SMLQ

Small Queue: Selects the size of all Descriptor queues and lists. When SMLQ = 0, the
size is 4k bytes; when SMLQ = I, the size is 1k bytes. Note that data pages are always
4k bytes.

D7

SMLB

Small Bursts: Selects size of bursts on ABus. When SMLB = 0, the BSI device uses 1-,
4-, and 8-word transfers. When SMLB = I, the BSI device uses 1- and 4-word transfers.

fII

2-283

5.0 Control Information (Continued)
Pointer RAM Control and Address Register (PCAR)
The Pointer RAM Control and Address Register (PCAR) is used to program the parameters for the PTOP (Pointer RAM
Operation) service function, in which data is written to or read from a Pointer RAM Register.
This register is not altered upon reset.
Access Rules

Address

Read

Write

02h

Always

Always

Register Bits
D7

I
Bit

BP1

D6

I

SPO

I

D5

04

D3

D2

01

DO

PTRW

A4

A3

A2

A1

AO

Description

Symbol

00-4

AO-4

Pointer RAM Address: These five bits contain the Pointer RAM Register address for a

05

PTRW

PTOP Read/Write: This bit determines whether a PTOP service function will be a read

subsequent PTOP service function.
from the Pointer RAM Register to the mailbox in memory (PTRW
Pointer RAM Register from the mailbox (PTRW = 0).
06-7

SPO-1

= 1), or a write to the

Byte Pointer: These two bits are used to program an internal byte pointer for accesses to
the 32-bit Mailbox Address Register. They are normally set to Zero to initialize the byte
painter for four successive writes (most-significant byte first) and are automatically
incremented after each write.

2-284

5.0 Control Information (Continued)
Mailbox Address Register (MBAR)
The Mailbox Address Register (MBAR) is used to program the word-aligned 28-bit memory address of the mailbox used in the
data transfer of the PTOP (Pointer RAM Operation) service function.
The address of this register is used as a window into four internal byte registers. The four byte registers are loaded by
successive writes to this address after first setting the SPR bits in the Pointer RAM Control and Address Register to Zero. The
bytes must be loaded most-significant byte first. The BSI device increments the byte pOinter internally after each write or read.
Mailbox Address bits 0 and 1 forced internally to Zero.
This register is initialized to a silicon Revision code upon reset. The Revision code remains until it Is overwritten by the host.
Access Rules
Address

Read

Write

03h

Always

Always

Register Bits

o

7
Mailbox Address [27:24]
Mailbox Address [23:16]
Mailbox Address [15:8]
Mailbox Address [7:0]

2-285

5.0 Control Information (Continued)
Master Attention Register (MAR)
The Master Attention Register (MAR) collects enabled attentions from the State Attention Register, Service Attention Register,
No Space Attention Register, Request Attention Register, and Indicate Attention Register. If the Notify bit in the Master Notify
Register and the corresponding bit in the MAR are set to One, the INT is forced to LOW and thus triggers an interrupt.
Writes to the Master Attention Register are permitted, but do not change the contents.
All bits in this register are set to Zero upon reset.
Access Rules
Address

I

Read

I

04h

Write

I

Always

Data Ignored

I

Register Bits
D7

I
Bit
DO-2

STA

D6

I

NSA

D5

I

SVA

D4

I

RQA

D2

D3

I

INA

Symbol

I

RES

D1

I

RES

DO

I

RES

I

Description

RES

Reserved

D3

INA

Indicate Attention Register: Is set if any bit in the Indicate Attention Register is set.

D4

RQA

Request Attention Register: Is set if any bit in the Request Attention Register is set.
Service Attention Register: Is set if any bit in the Service Attention Register is set.

D5

SVA

D6

NSA

No Space Attention Register: Is set if any bit in the No Space Attention Register is set.

D7

STA

State Attention Register: Is set if any bit in the State Attention Register is set.

2-286

C

"0

5.0 Control Information (Continued)

co
W

Master Notify Register (MNR)
The Master Notify Register (MNR) is used to enable attentions in the Master Attention Register (MAR). If a bit in Register MNR
and the corresponding bit in Register MAR are set to One, the INT signal is deasserted and causes an interrupt.

N

en

U1

All bits in this register are set to Zero upon reset.
Access Rules
Address

I

Read

I

05h

Write

Always

I

I

Always

Register Bits

07

I
Bit

STAN

06

I

NSAN

05

I

SVAN

04

I

ROAN

03

I

INAN

Symbol

01

02

I

RES

I

RES

DO

I

RES

I

Description

00-2

RES

Reserved

03

INAN

Indicate Attention Register Notify: This bit is used to enable the INA bit in Register MNR.

04

ROAN

Request Attention Register Notify: This bit is used to enable the ROA bit in Register MNR.

05

SVAN

Service Attention Register Notify: This bit is used to enable the SVA bit in Register MNR.

06

NSAN

No Space Attention Register Notify: This bit is used to enable the NSA bit in Register MNR.

07

STAN

State Attention Register Notify: This bit is used to enable the STA bit in Register MNR.

EI

2-287

5.0 Control Information (Continued)
State Attention Register (STAR)
The State'Attention Register (STAR) controls the state of the Indicate, Request, and Status/Space Machines. It also records
parity, internal logic, and ABus transaction errors. Each bit may be enabled by setting the corresponding bit in the State Notify
Register.
Access Rules
Address

I

Read

I

06h

Write

I

Always

Conditional

I

Register Bits
07

I

ERR

06

I

BPE

05

I

04

CPE

I

CWI

03

I

CMDE

02

I

01

SPSTOP

I

ROSTOP

DO

I

INSTOP

I

Bit

Symbol

Description

DO

INSTOP

Indicate Stop: This bit is set by the host to place the Indicate Machine in Stop Mode. This
bit is set ,by the BSI device when the Indicate state machine detects an internal error,
enters an invalid state, or when the host loads the Indicate Header Length Register with an
illegal value. This bit is set upon reset.

D1

ROSTOP

Request Stop: This bit is set by the host to place the Request Machine in Stop Mode. This
bit is set by the BSI device when the Request Machine detects an internal error or enters
an invalid state. It is also set when an ABus error occurs while storing a Confirmation
Status Message Descriptor (CNF). This bit is set upon reset.

D2

SPSTOP

Status/Space Stop: This bit is set by the host to place the Status/Space Machine in Stop
Mode. This bit is set by the BSI device when the Status/Space Machine has entered
STOP Mode because of an unrecoverable error. In STOP Mode, only PTOP or LMOP
service functions will be performed. This bit is set upon reset.

D3

CMDE

Command Error: Indicates that the host performed an invalid operation. This occurs when
an invalid value is loaded into the Indicate Header Length Register (which also sets the
INSTOP attention). This bit is cleared upon reset.

D4

CWI

Conditional Write Inhibit: Indicates that at least one bit of the previous conditional write
operation was not written. This bit is set unconditionally after each write to a conditional
write register. It is also set when the value of the Compare Register is not equal to the
value of the register that was accessed for a write before it was written. This may indicate
that the accessed register has changed since it was last read. This bit is cleared after a
successful conditional write. CWI bit does not contribute to setting the STA bit of the
Master Attention Register because its associated Notify bit is always O. This bit is cleared
upon reset.

D5

CPE

Control Bus Parity Error: Indicates a parity error detected on CBD? -0. If there is a
Control Bus parity error during a host write, the write is suppressed. Control Bus parity
errors are reported when flow-through parity is enabled (the FLOW bit of the Mode
Register is set). This bit is cleared upon reset.

D6

BPE

BMAC Device Parity Error: Indicates parity error detected on MID? -0. BMAC device
parity is always checked during a frame. This bit is cleared upon reset.

D?

ERR

Error: This bit is set by the BSI device when a non-recoverable error occurs. These
include an ABus transaction error while writing confirmation status, an internal logic error,
or when any state machine enters an invalid state. This bit is cleared upon reset.

2-288

5.0 Control Information (Continued)
State Notify Register (STNR)
The State Notify Register (STNR) is used to enable bits in the State Attention Register (STAR). If a bit in Register STNR is set to
One, the corresponding bit in Register STAR will be applied to the Master Attention Register, which can be used to generate an
interrupt to the host.
All bits in this register are cleared to Zero upon reset.
Access Rules
Address

I

Write

Read

I

07h

I

Always

I

Always

Register Bits
D7

I

ERRN

D6

I

BPEN

D5

I

CPEN

D4

I

CWIN.

D3

I

D2

CMDEN

I

SPSTOPN

DO

D1

I

RQSTOPN

I

INSTOPN

I

Bit

Symbol

DO

INSTOPN

Indicate Stop Notify: This bit is used to enable the INSTOP bit in Register STAR.

Description

D1

RQSTOPN

Request Stop Notify: This bit is used to enable the RQSTOP bit in Register STAR.

D2

SPSTOPN

Status/Space Stop Notify: This bit is used to enable the SPSTOP bit in Register STAR.

D3

CMDEN

Command Error Notify: This bit is used to enable the CMDE bit in Register STAR.

D4

CWIN

Conditional Write Inhibit Notify: This bit is used to enable the CWI bit in Register STAR.

D5

CPEN

Control Bus Parity Error Notify: This bit is used to enable the CPE bit in Register STAR.

D6

BPEN

BMAC Device Parity Error Notify: This bit is used to enable the BPE bit in Register STAR.

D7

ERRN

Error Notify: This bit is used to enable the ERR bit in Register STAR.

•
2·289

5.0 Control Information (Continued)
Service Attention Register (SAR)
The Service Attention Register (SAR) is used to present the attentions for the service functions. Each bit may be enabled by
setting the corresponding bit in the State Notify Register.
Access Rules
Read

Address

I

I

OSh

Write

Always

I

Conditional

I

RES

I

Register Bits
D7

I

RES

D6

I

RES

D5

I

RES

D3

D4

I

ABRO

D2

I

ABR1

DO

D1

I

LMOP

I

PTOP

I

Description

Bit

Symbol

DO

PTOP

Pointer RAM Operation: This bit is cleared by the host to cause the BSI device to transfer
data between a Pointer RAM Register and a mailbox location in memory. The Pointer RAM
Control and Address Register contains the Pointer RAM Register address and determines
the direction of the transfer (read or write). The memory address is in the Mailbox Address
Register. This bit is set by the BSI device after it performs the data transfer.
While PTOP = 0 , the host must not aiter the Pointer RAM Address and Control Register
or the Mailbox Address Register.

D1

LMOP

Limit RAM Operation: This bit is cleared by the host to cause the BSI device to transfer
data between a Limit RAM Register and the Limit Data and Limit Address Registers. The
Limit Address Register contains the Pointer RAM Register address and determines the
direction of the transfer (read and write). This bit is set by the BSI device after it data
performs the transfer.
While LMOP = 0, the host must not alter either the Limit Address or Limit Data Registers.

D2

ABR1

Abort Request RCHN1: This bit is cleared by the host to abort a Request on RCHN1. This
bit is set by the BSI device when RQABORT ends a request on RCHN1. The host may
write a 1 to this bit, which mayor may not prevent the request from being aborted. When
this bit is cleared by the host, the USR1 bit in the Request Attention Register is set and
further processing on RCHN1 is halted.

D3

ABRO

Abort Request RCHNO: This bit is cleared by the host to abort a Request on RCHNO. This
bit is set by the BSI device when RQABORT ends a request on RCHNO. The host may
write a 1 to this bit, which mayor may not prevent the request from being aborted. When
this bit is cleared by the host, the USRO bit in the Request Attention Register is set and
further processing on RCHNO is halted.

D4-7

RES

Reserved

2·290

5.0 Control Information (Continued)
Service Notify Register (SNR)
The Service Notify Register (SNR) is used to enable attentions in the Service Attention Register (SAR). If a bit in Register SNR is
set to One, the corresponding bit in Register SAR will be applied to the Master Attention Register, which can be used to
generate an interrupt to the host.
All bits in this register are set to Zero upon reset.
Access Rules
Address

I

Read

I

09h

Write

I

Always

I

Always

Register Bits
07

I

RES

06

I

RES

Bit

Symbol

00

PTOPN

05

I

04

RES

I

RES

03

I

02

ABRON

I

ABR1N

01

I

LMOPN

DO

I

PTOPN

I

Description
Pointer RAM Operation Notify: This bit is used to enable the PTOP bit in Register SAR.

01

LMOPN

Limit RAM Operation Notify: This bit is used to enable the LMOP bit in Register SAR.

02

ABR1N

Abort Request RCHN1 Notify: This bit is used to enable the ABR1 bit in Register SAR.

03

ABRON

Abort Request RCHNO Notify: This bit is used to enable the ABRO bit in Register SAR.

RES

Reserved

04-7

2-291

5.0 Control Information (Continued)
No Space Attention Register (NSAR)
The No Space Attention Register (NSAR) presents the attentions generated when the CNF, PSP, or lOUD Queues run out of
space. The host may set any attention bit to cause an attention for test pUrposes only, though this should not be done during
normal operation.
The No Data Space attentions are set and cleared by the BSI device automatically. The No Status Space attentions are set by
the BSI device, and must be cleared by the host.
Upon reset this register is set to Oxffh.
Access Rules
Address

I

Read

I

OAh

Write

I

Always

I

Conditional

Register Bits
D7

I

NSRO

D6

I

NSR1

D5

I

LDIO

D4

I

NSIO

D3

I

LDI1

D1

D2

I

NSll

I

LDI2

DO

I

NSI2

I

Bit

Symbol

DO

NSI2

No Status Space on ICHN2: This bit is set by the BSI device upon a Reset, or when an IDUD has been written to
the next-to-Iast available entry in the Indicate Channel's IDUD Status Queue. When this occurs, the BSI device
stops copying on ICHN2 and the last lOUD is written with special status. This bit (as well as the USR Attention bit)
must be cleared by the host before the BSI device will resume copying on this Channel.

Description

01

LDI2

Low Data Space on ICHN2: This bit is set by the BSI device upon a Reset, or when a PSP is prefetched from
ICHN2's last PSP Queue location (as defined by the PSP Queue Limit Register). Note that the amount of warning
is dependent on the length of the frame. There will always be one more page (4k bytes) available for the BSI
device when this attention is generated. Another FDDI maximum-length frame (after the current one) will not fit in
this space. If SPS fetching was stopped because there were no more PSP entries, fetching will resume
automatically when the PSP Queue Limit Register is updated.

D2

NSll

No Status Space on ICHN1: This bit is set by the BSI device upon a Reset, or when an lOUD has been written to
the next-to-Iast available entry in the Indicate Channel's lOUD Status Queue. When this occurs, the BSI device
stops copying on ICHNl and the last lOUD is written with special status. This bit (as well as the USR Attention bit)
must be cleared by the host before the BSI device will resume copying on this Channel.

D3

LOll

Low Data Space on ICHN1: This bit is set by the BSI device upon a Reset, or when a PSP is prefetched from
ICHNl 's last PSP Queue location (as defined by the PSP Queue Limit Register). Note that the amount of warning
is dependent on the length of the frame. There will always be one more page (4k bytes) available for the BSI
device when this attention is generated. Another FOOl maximum-length frame (after the current one) will not fit in
this space. If PSP fetching was stopped because there were no more PSP entries, fetching will resume
automatically when the PSP Queue Limit Register is updated.

D4

NSIO

No Status Space on ICHNO: This bit is set by the BSI device upon a Reset, or when an lOUD has been written to
the next-to-Iast available entry in the Indicate Channel's IDUD Status Queue. When this occurs, the BSI device
stops copying on ICHNO and the last IDUD is written with special status. This bit (as well as the USR Attention bit)
must be cleared by the host before the BSI device will resume copying on this Channel.

D5

LDIO

Low Data Space on ICHNO: This bit is set by the BSI device upon a Reset, or when a PSP is prefetched from
ICHNO's last PSP Queue location (as defined by the PSP Queue Limit Register). Note that the amount of warning
is dependent on the length of the frame. There will always be one more page (4k bytes) available for the BSI
device when this attention is generated. Another FDDI maximum-length frame (after the current one) will not fit in
this space. If PSP fetching was stopped because there were no more PSP entries, fetching will resume
automatically when the PSP Queue Limit Register is updated.

D6

NSRl

No Status Space on RCHN1: This bit is set by the BSI device upon a Reset, or when it has written a CNF
Descriptor to the next-to-Iast Queue location. Due to internal pipelining, the BSI device may write up to two more
CNFs to the Queue after this attention is generated. Thus the Host must set the CNF Queue Limit Register to be
one less than the available space in the Queue. This bit (as well as the USR attention bit) must be cleared by the
Host before the BSI device will continue to process requests on RCHN1.

D7

NSRO

No Status Space on RCHNO: This bit is set by the BSI device upon a Reset, or when it has written a CNF
Descriptor to the next-Io-Iast Queue location. Due to internal pipelining, the BSI device may write up to two more
CNFs to the Queue after this attention is generated. Thus the Host must set the CNF Queue Limit Register to be
one less than the available space in the Queue. This bit (as well as the USR attention bit) must be cleared by the
Host before the BSI device will continue to process requests on RCHNO.

2-292

5.0 Control Information (Continued)
No Space Notify Register (NSNR)
The No Space Notify Register (NSNR) is used to enable attentions in the No Space Attention Register (NSAR). If a bit in
Register NSNR is set to One, the corresponding bit in Register NSAR will be applied to the Master Attention Register, which can
be used to generate an interrupt to the host.
All bits in this register are set to Zero upon reset.
Access Rules
Address

I

Read

I

OSh

Write

Always

I

I

Always

Register Bits
D7

I

D6

NSRON

I

NSR1N

D5

I

LDION

D4

I

NSION

D3

I

LDl1N

D2

I

NSI1N

D1

I

LDI2N

DO

I

NSI2N

I

Bit

Symbol

DO

NSI2N

No Status Space on ICHN2 Notify: This bit is used to enable the NSI2 in Register NSAR.

Description

D1

LDI2N

Low Data Space on ICHN2 Notify: This bit is used to enable the LDI2 in Register NSAR.

D2

NSI1N

No Status Space on ICHN1 Notify: This bit is used to enable the NSI1 in Register NSAR.

D3

LDI1N

Low Data Space on ICHN1 Notify: This bit is used to enable the LDI1 in Register NSAR.

D4

NSION

No Status Space on ICHNO Notify: This bit is used to enable the NSIO in Register NSAR.

D5

LDION

Low Data Space on ICHNO Notify: This bit is used to enable the LDIO in Register NSAR.

D6

NSR1N

No Status Space on RCHN1 Notify: This bit is used to enable the NSR1 in Register NSAR.

07

NSRON

No Status Space on RCHNO Notify: This bit is used to enable the NSRO in Register NSAR.

PI

2-293

5.0 Control Information (Continued)
Limit Address Register (LAR)
The Limit Address Register (LAR) is used to program the parameters for a LMOP (Limit RAM Operation) service function.
This register is not altered upon reset.
Access Rules
Address

I

Read

I

OCh

Always

Write

I

I

Always

Register Bits

07

I

LRA3

06

I

LRA2

05

I

LRA1

04

I

LRAO

03

I

LMRW

02

I

RES

01

I

RES

DO

I

LROS

I

Bit

Symbol

DO

LROS

Limit RAM Data Bit 8: This bit contains the most-significant data bit read or written from
the addressed Limit RAM Register.

RES

Reserved

LMRW

LMOP Read/Write: This bit determines whether a LMOP service function will be a read
(LMRW = 1) or write (LMRW = 0).

LRAO-3

Limit RAM Register Address: Used to program the Limit RAM Register address for a
subsequent LMOP service function.

D1-2
03
04-7

Description

2-294

5.0 Control Information (Continued)
Limit Data Register (LDR)
The Limit Data Register (LOR) is used to contain the B least-significant Limit RAM data bits transferred in a LMOP service
function. (The most-significant data bit is in the Limit Address register.)
This register is not altered upon reset.
Access Rules
Read

Address

I

I

ODh

Always

Write

I

Always

I

Register Bits
D7

I

LRD7

D6

I

LRD6

Bit

Symbol

00-7

LRDO-7

D5

I

LRD5

D4

I

LRD4

D2

D3

I

LRD3

I

LRD2

D1

I

LRDl

DO

I

LRDO

I

Description
Limit RAM Data Bits 0-7: These bits contain the least-significant data bits read from or
written to a Limit RAM Register in a LMOP service function.

2-295

I
Q

5.0 Control Information (Continued)
Request Attention Register (RAR)
The Request Attention Register (RAR) Is used to present exception, breakpoint, request complete, and unserviceable request
attentions generated by each Request Channel. Each bit may be enabled by setting the corresponding bit in the Request Notify
Register.
All bits in this register are set to Zero upon reset.
Access Rules
Address

I

Read

I

OEh

Register Bits
D7

D6

Write

I

Always

D5

Conditional

D4

I
D3

02

01

00

I USRRO I RCMRO I EXCRO I SRKRO I USRR1 I RCMR1 I EXCR1 I SRKR1 I
Bit

Symbol

DO

SRKR1

Breakpoint on RCHN1: Is set by the SSI device when a CNF DeSCriptor Is written on
RCHN1. No action Is taken by the SSI device if the host sets this bit.

Description

D1

EXCR1

Exception on RCHN1: Is set by the SSI device when an exception occurs on RCHN1. No
action Is taken by the SSI device if the host sets this bit.

D2

RCMR1

Reque.t Complete on RCHN1: Is set by the SSI device when it has completed
processing a Request object on RCHN1, an error occurs. or a completion exception
occurs. No action is taken if the Host sets this bit.

D3

USRR1

Un.ervlceable Reque.t on RCHN1: Is set by the SSI device when a Request cannot be
processed on RCHN1. This occurs when the Request Class is inappropriate for the current
ring state, or when there Is no CNF status space, or when the host aborts a request by
clearing the ASR bit in the Service Attention Register. While this bit is set, no requests will
be processed on RCHN1. The host must clear this bit to resume request processing.

D4

SRKRO

Breakpoint on RCHNO: Is set by the SSI device when a CNF Descriptor Is written on
RCHNO. No action Is taken by the SSI device if the host sets this bit.

D5

EXCRO

Exception on RCHNO: Is set by the SSI device when an exception occurs on RCHNO. No
action Is taken by the SSI device If the host sets this bit.

D6

RCMRO

Request Complete on RCHNO: Is set by the SSI device when it has completed
processing a Request object on RCHNO, an error occurs, or a completion exception
occurs. No action is taken if the Host sets this bit.

D7

USRRO

Unserviceable Request on RCHNO: Is set by the SSI device when a Request cannot be
processed on RCHNO. This occurs when the Request Class is inappropriate for the current
ring state, or when there Is no CNF status space, or when the host aborts a request by
clearing the ASR bit in the Service Attention Register. While this bit is set, no requests will
be processed on RCHNO. The host must clear this bit to resume request processing.

2-296

5.0 Control Information (Continued)
Request Notify Register (RNR)
The Request Notify Register (RNR) Is used to enable attentions in the Request Attention Register (RAR). If a bit in Register
RNR is set to One, the corresponding bit in Register RAR will be applied to the Master Attention Register, which can be used to
generate an interrupt to the host.
All bits in this register are set to Zero upon reset.
Access Rules
Read

Address

I

I

OFh

Register Bits
D7

I

USRRON

Always

D6

I

RCMRON

Bit

Symbol

00

BRKR1N

Write

I

D5

I

EXCRON

Always

D4

I

BRKRON

I
D3

I

USRR1N

D1

D2

I

RCMR1N

I

EXCR1N

DO

I

BRKR1N

I

Description
Breakpoint on RCHN1 Notify: This bit is used to enable the BRKR1 bit in Register RAR.

01

EXCR1N

Exception on RCHN1 Notify: This bit is used to enable the EXCR1 bit in Register RAR.

02

RCMR1N

Request Complete on RCHN1 Notify: This bit is used to enable the RCMR1 bit in
Register RAR.

03

USRR1N

Unserviceable Request on RCHN1 Notify: This bit is used to enable the USRR1 bit in
Register RAR.

04

BRKRON

Breakpoint on RCHNO Notify: This bit is used to enable the BRKRO bit in Register RAR.

05

EXCRON

Exception on RCHNO Notify: This bit is used to enable the EXCRO bit in Register RAR.

06

RCMRON

Request Complete on RCHNO Notify: This bit is used to enable the RCMRO bit in
Register RAR.

07

USRRON

Unserviceable Request on RCHNO Notify: This bit is used to enable the USRRO bit in
Register RAR.

!II

2·297

5.0 Control Information (Continued)
Request Channel 0 and 1 Configuration Registers (ROCR and R1CR)
The two Request Configuration Registers (ROCR and R1CR) are programmed with the operational parameters for each of the
Request Channels. These registers may only be altered between Requests, i.e., while the particular Request Channel does not
have a Request loaded.
These registers are not altered upon reset.
Access Rules
Address

I

Write

Read

I

10-11h

Always

I

Always

I

Register Bits
D7

I

TI1

D6

I

TIO

D5

I

PRE

D4

I

HLD

D3

I

FCT

D1

D2

I

SAT

I

VST

.DO

I

FCS

I

Bit

Symbol

DO

FCS

Frame Check Sequence Disable: When this bit is set, the BSI device asserts the FCST
signal throughout the request. This may drive the BMAC device FCST pin, or also the SAT
or SAIGT pins, depending on the application. This bit is normally used to program the
BMAC device not to concatenate its generated FCS to the transmitted frame. The Valid
FCS bit in the Expected Frame Status Register independently determines whether a frame
needs a valid FCS to meet the matching frame criteria.

Description

D1

VST

Void Stripping: When this bit is set, the BSI device asserts the STRIP output signal out
throughout the request. This may drive the BMAC device STRIP (Void Strip) pin, or also
the SAT pin, depending on the application.

D2

SAT

Source Address Transparency: When this bit is set, the BSI device asserts the SAT
output signal throughout the request. This may drive the BMAC device's SAT and/or
SAIGT pins, depending on the application. When SAT is set, Full Confirmation requires the
use of the EM (External SA Match) signal.

D3

FCT

Frame Control Transparency: When this bit is set, the FC will be sourced from the ODU
(not the REO. First Descriptor). When Full Confirmation is enabled and FCT = 0, all bits of
the FC in returning frames must match the FC field in the REO Descriptor; if FCT = 1, only
the C, Land r bits must match.
Note that since the BSI device decodes the REO.F Descriptor FC field to determine
whether to assert ROCLM/ROBCN, FC transparency may be used to send Beacons or
Claims in any ring non-operational state, as long as the FC in the REO Descriptor is not set
to Beacon or Claim. By programming a Beacon or Claim FC in the REO Descriptor, then
using FC transparency, any type of frame may be transmitted in the Beacon or Claim state.

D4

HLD

Hold: When this bit is set, the BSI device will not end a service opportunity until the
Request is complete. When this bit is Zero, the BSI device ends the service opportunity on
the Request Channel when all of the following conditions are met:
1. There is no valid request active on the Request Channel.
2. The service class is non-immediate.
3. There is no data in the FIFO.
4. There is no valid REO fetched by the BSI device.
This bit also affects Prestaging on RCHN1 (Request Channel 1). When HLD = 0,
prestaging is enabled on RCHN1, regardless of the state of the PRE bit (except for
Immediate service classes). When HLD = 1, prestaging is determined by the PRE bit. This
option can potentially waste ring bandwidth, but may be required (particularly on RCHNO,
Request Channel 0) if a small guaranteed service time is required.
When using the Repeat option, HLD is required for small frames. If HLD is not used, the
other Request Channel will be checked for service before releasing the token between
frames. This may not be the desired action, particularly if there is a request on RCHN1 that
needs servicing after the completion of RCHNO's Repeated Request.

2-298

C

."

5.0 Control Information (Continued)

CD
Co)

Request Channel 0 and 1 Configuration Registers (ROCR and R1CR) (Continued)
Symbol

Bit

Description

D5

PRE

Preempt/Prestage: When this bit is set, preemption is enabled for RCHNO, and prestaging is enabled for
RCHN1 (prestaging is always enabled for RCHNO). When this bit Zero, preemption is disabled and prestaging is
enabled only on RCHNO.
When preemption is enabled, RCHNO preempts a (non-committed) frame of RCHN1 already in the FIFO,
causing it to be purged and refetched after RCHNO's request has been serviced. When the Request Machine is
servicing a request on RCHN1 and a request on RCHNO becomes active, if preemption is enabled on RCHNO,
the Request Machine will finish transmitting the current frame on RCHN1, then release the token and move
back to the start state. This has the effect of reprioritizing the Request Channels, thus ensuring that frames on
RCHNO are transmitted at the next service opportunity. When RCHNO has been serviced, transmission will
continue on RCHN1 with no loss of data.
When prestaging is enabled, the next frame for RCHN1 is staged (ODUs are loaded into the FIFO before the
token arrives). If prestaging is not enabled, the Request Machine waits until the token is captured before
staging the first frame. Once the token is captured, the Request Machine begins fetching data, and when the
FIFO threshold has been reached, transmits the data on that Request Channel. For requests with an Immediate
service class, prestaging is not applicable.
When this bit is Zero, preemption is disabled for RCHNO, and requests on RCHN1 will not be prestaged unless
the HLD bit is Zero, in which case RCHN1 will prestage data regardless of the setting of the PRE bit.
Note that when prestaging is not enabled on RCHN1, data is not staged until the token is captured. Since there
is no data in the FIFO (if there is no active request on RCHNO), the BSI device will immediately release the
token if the HLD option is not set.

D6-7

TTO-1

N
CD

en

Transmit Threshold: Determines the threshold on the output data FIFO before the BSI device requests
transmission.
TT1
TTO
Threshold Value
o
0
a Words
o
1
16 Words
1
o
Reserved
1
1
Reserved

•
2-299

5.0 Control Information (Continued)
Request Channel 0 and 1 Expected Frame Status Registers (ROEFSR and R1EFSR)
The Expected Frame Status Registers (ROEFSR and R1EFSR) define the matching criteria used for Full Confirmation of
. returning frames on each Request Channel. A returning frame must meet the programmed criteria to be counted as a matching
frame.
These registers are not altered upon reset.
Access Rules
Address

I

12-13h

Read

I

Always

Write

I

I

Always

Register Bits
D7

I

VOL

Bit

Symbol

00-1

ECO-1

02-3

04-5

EAO-1

EEO-1

D6

I

VFCS

D5

I

EE1

D4

I

EEO

D3

I

EA1

D2

I

EAO

DO

D1

I

EC1

I

ECO

I

Description
Expected C Indicator:
EC1
ECO
0
0
0
1
0
1
1
1

Value
Any
R
S
RorS

Expected AIndicator:
EA1
EAO
0
0
0
1
0
1
1
1

Value
Any
R
S
RorS

Expected E Indicator:
EE1
EEO
0
0
0
1
0
1
1
1

Value
Any
R
S
RorS

06

VFCS

Valid FCS: When this bit is set, returning frames must have a valid FCS field to meet the confirmation criteria.

07

VOL

Valid Data Length: When this bit is set, returning frames must have a valid VOL field to meet the confirmation
criteria.

2-300

5.0 Control Information

(Continued)

Indicate Attention Register (lAR)
The Indicate Attention Register (IAR) is used to present exception and breakpoint attentions generated by each Indicate
Channel. An Attention bit is set by hardware when an exception or breakpoint occurs on the corresponding Indicate Channel.
Each bit may be enabled by setting the corresponding bit in the Indicate Notify Register.
Access Rules
Address

I

Write

Read

I

14h

Always

I

Conditional

I

Register Bits
D7

I

RES

D6

I

RES

D5

I

EXCIO

D4

I

BRKIO

D3

I

EXCI1

D2

I

BRKI1

D1

I

EXCI2

DO

I

BRKI2

I

Bit

Symbol

00

BRKI2

Breakpoint on ICHN2: Is set when a breakpoint is detected on Indicate Channel 2. No
action is taken if the host sets this bit.

01

EXCI2

Exception on ICHN2: Is set by the BSI device when an exception occurs on Indicate
Channel 2. May be set by the host to disable copying on ICHN2, which is convenient when
updating the Indicate Header Length and Indicate Threshold registers. While this bit is set,
copying is disabled on ICHN2.

02

BRKI1

Breakpoint on ICHN1: Is set when a breakpoint is detected on Indicate Channel 1. No
action is taken if the host sets this bit.

03

EXCI1

Exception on ICHN1: Is set by the BSI device when an exception occurs on Indicate
Channel 1. May be set by the host to disable copying on ICHN1, which is convenient when
updating the Indicate Header Length and Indicate Threshold registers. While this bit is set,
copying is disabled on ICHN1.

04

BRKIO

Breakpoint on ICHNO: Is set when a breakpoint is detected on ICHNO. No action is taken
if the host sets this bit.

05

EXCIO

Exception on ICHNO: Is set by the BSI device when an exception occurs on Indicate
Channel O. May be set by the host to disable copying on ICHNO, which is convenient when
updating the Indicate Header Length and Indicate Threshold registers. While this bit is set,
copying is disabled on ICHNO.

RES

Reserved

06-7

Description

- ---

_. - --

•
2·301

5.0 Control Information (Continued)
Indicate Notify Register (INR)
The Indicate Notify Register (lNR) is used to enable attentions in the Indicate Attention Register (lAR). If a bit in Register INR is
set to One, the corresponding bit in Register IAR will be applied to the Master Attention Register, which can be used to generate
an interrupt to the host.
All bits in this register are set to Zero upon reset.
Access Rules
Address

I

Read

I

15h

Write

I

Always

Always

I

Register Bits
D7

I

RES

Bit
DO

D6

I

RES

D5

I

D4

EXCON

I

BRKON

D3

I

EXC1N

Symbol

D2

I

BRK1N

01

I

EXC2N

DO

I

BRK2N

I

Description

BRK2N

Breakpoint on ICHN2 Notify: This bit is used to enable the BRK2 bit in Register IAR.

D1

EXC2N

Exception on ICHN2 Notify: This bit is used to enable the EXC2 bit in Register IAR.

D2

BRK1N

Breakpoint on ICHN1 Notify: This bit is used to enable the BRK1 bit in Register IAR.
Exception on ICHN1 Notify: This bit is used to enable the EXC1 bit in Register IAR.

D3

EXC1N

D4

BRKON

Breakpoint on ICHNO Notify: This bit is used to enable the BRKO bit in Register IAR.

D5

EXCON

Exception on ICHNO Notify: This bit is used to enable the EXCO bit in Register IAR.

D6-7

RES

Reserved

2-302

.----------------------------------------------------------------------.0
"'CI
CCI
5.0 Control Information (Continued)
Co)

N

Indicate Threshold Register (ITR)

Q)

The Indicate Threshold Register (lTR) specifies the maximum number of frames that can be received on Indicate Channel 1 or
Indicate Channel 2 before an attention will be generated. This register may be written only when the INSTOP bit in the State
Attention Register is set, or when the Indicate Channel's corresponding EXC bit in the Indicate Attention Register is set.

U1

This register is not altered upon reset.
Access Rules
Address
16h

Read
Always

I

Write
I

INSTOP Mode or EXC = 1 Only

I

Register Bits
07
I

THR7

06
I

THR6

05
I

THR5

04
I

THR4

03
I

THR3

01

02
I

THR2

I

THR1

DO
I

THRO

I

Bit

Symbol

Description

DO-7

THRO-7

Threshold Data Bits 0-7: The value programmed in this register is loaded into an internal
counter every time the Indicate Channel changes. Each valid frame copied on the current
Channel decrements the counter. When the counter reaches Zero, a status breakpoint
attention is generated (i.e., the Channel's BRK bit in the Indicate Attention Register is set)
if the Channel's Breakpoint on Threshold (BOn bit in the Indicate Mode Register is set.
Loading the Indicate Threshold Register with Zero generates a breakpoint after 256
consecutive frames are received on anyone Indicate Channel.

FII

2-303

5.0 Control Information (Continued)
Indicate Mode Register (IMR)
The Indicate Mode Register (lMR) defines configuration options for all three Indicata Channels, including the sort mode, frame
filtering, and status breakpoints.
This register may be written only when the INSTOP bit in the State Attention Register is set. It may be written with Its current
value any time, which is useful for one-shot sampling.
This register is not altered upon reset.
Access Rules
Address

I

Read

I

17h

Always

Write

I

INSTOP Mode Only

I

Register Bits
D7

I

SMl

D6

I

SMO

D5

I

SKIP

D4

I

RES

D3

I

BOTl

D1

D2

I

BOT2

I

BOB

DO

I

BOS

I

Bit

Symbol

00

BOS

Breakpoint on Service Opportunity: Enables the end of a service opportunity to
generate an Indicate breakpoint attention (i.e., set the Channel's BRK bit in the Indicate
Attention Register). Service opportunities include receipt of a Token, a MAC Frame, or a
ring operational change following some copied frames.

Description

01

BOB

Breakpoint on Burst: Enables the end of a burst to generate an Indicate breakpoint
attention (i.e., set the Channel's BRK bit in the Indicate Attention Register). End of burst
includes Channel change, OA change, SA change, or MAC INFO change. A Channel
change is detected from the FC field of valid, copied frames. A OA change is detected
when a frame's OA field changes from our address to any other. A SA change is detected
when a frame's SA field is not the same as the previous one. A MAC INFO breakpoint
occurs when a MAC frame does not have the identical first four bytes of INFO as the
previous frame. This breakpoint always sets the BRK bit (I.e., this breakpoint is always
enabled).

02

BOT2

Breakpoint on Threshold for ICHN2: Enables the value in the Indicate Threshold
Register to be used to generate an Indicate breakpoint attention on Indicate Channel 2,
(i.e., set the BRK2 bit in the Indicate Attention Register).

03

BOTl

Breakpoint on Threshold for ICHN1: Enables the value in the Indicate Threshold
Register to be used to generate an Indicate breakpoint attention on ICHN1, (i.e., set the
BRKl bit in. the Indicate Attention Register.

04

RES

Reserved

05

SKIP

Skip Enable: Enables filtering on Indicate Channel 0 when the Copy Control field for
ICHNO in the Indicate Configuration Register is set to 01 or 10. When this bit is set, only
the unique MAC and SMT frames received on Indicate Channel 0 will be copied to
memory, i.e., those having an FC field or first four bytes of the Information field that differs
from the previous frame.
A write to the Indicate Mode Register disables filtering.

2-304

.----------------------------------------------------------------------,0
;g

5.0 Control Information (Continued)

~

m

Indicate Mode Register (lMR) (Continued)

UI

Bit

Symbol

Description

SMO-1

06-7

Sort Mode: These bits determine how the BSI device sorts Indicate data onto Indicate Channels 1 and 2.
(Indicate Channel 0 always receives SMT and MAC frames.)
SM1
SMO
ICHN2
ICHN1
o
0
Asynchronous
Synchronous
o
1
External
Internal
1
0
Info
Header
1
1
Low Priority
High Priority
The Synchronous/Asynchronous Sort Mode is intended for use in end-stations or applications using
synchronous transmission.
The Internal/External Sorting Mode is intended for bridging or monitoring applications. MAC/SMT frames
matching the internal (BMAC device) address are sorted onto ICHNO, and all other frames matching the
BMAC device's internal address (short or long) are sorted onto ICHN1. All frames matching the external
address (frames requiring bridging) are sorted onto ICHN2 (including MAC/SMT). This sorting mode
utilizes the EM, EA, and ECIP input signals with external address matching circuitry. External address
circuitry must assert ECIP sometime from the assertion of FCRCVD up to the clock before the assertion of
INFORCVD. Otherwise, the BSI device assumes no external address comparison is taking place. ECIP
must be negated before EDRCVD; if not, the frame is not copied. EA and EM are sampled on the clock
after ECIP is negated. ECIP is ignored after it is negated, until FCRCVD is asserted again. To confirm
transmitted frames in this mode (typically using SAT), EM must be asserted within the same time frame as
EA. Note that internal matches have precedence over external matches.
The Header/Info Sort Mode is intended for high performance protocol processing. MAC/SMT frames are
sorted onto ICHNO, while all other frames are sorted onto ICHN1 and ICHN2. Frame bytes from the FC up
to the programmed header length are copied onto ICHN 1. The remaining bytes (info) are copied onto
ICHN2. Only one stream of IDUDs is produced (on ICHN1), but both Indicate Channel's PSP queues are
used for space (i.e., PSPs from ICHN1 for header space, and PSPs from ICHN2 for info space). Frames
may comprise a header only, or a header+ info. For frames with info, multi-part lOUD objects are
produced. For mUlti-part IDUDs, the Indicate Status field in the lOUD is used to determine which part of
the lOUD object pOints to the end of the header. The remainder of the lOUD object points to the Info.
For example, if page crosses occur while writing the header and while writing out the Info, the BSI Device
will generate a four part lOUD object (lDUD.First, IDUD.Middle, lOUD. Middle, lOUD. Last). The lOUD. First
will have a status of "page cross". The first IDUD.Middle will have a status of "end of header". The next
IDUD.Middle will have a status of "page boundary crossed". The IDUD.Last will have an "end of frame"
status.
The High Priority/Low Priority Sort Mode is intended for end stations using two priority levels of
asynchronous transmission. The priority is determined by the most-significant z-bit of the FC
(zzz = Oxx = low-priority; zzz = 1xx = high-priority).

fJI

2-305

5.0 Control Information (Continued)
Indicate Configuration Register (lCR)
The Indicate Configuration Register (ICR) is used to program the copy criteria for each of the Indicate Channels.
This register is not altered upon reset.
Access Rules
Address

I

18h

Read

I

Always

Write

I

Always

I

D4

D3

Register Bits
D7

I

D6

Bit
00-1

D5

I

CCO

RES

I

D1

D2

I

CC1

RES

I

DO
CC2

I

Description

Symbol
CC2

Copy ControllCHN2:
CC1
CCO
0
0
1
0
1
0
1
1

02

RES

Reserved

03-4

CC1

Copy ControllCHN1:
CC4
CC3
0
0
1
0
0
1
1
1

05

RES

Reserved

06-7

cco

Copy ControiICHNO:
CC7
CC6
0
0
0
1
0
1
1
1

Copy Mode
00 Not Copy
Copy if (AFLAG
ECIP & EA)) & - MFLAG
ECIP & EA)) MFLAG
Copy if (AFLAG
Copy Promiscously.

I(I (-

I

Copy Mode
00 Not Copy
Copy if (AFLAG
ECIP & EA)) & - MFLAG
Copy if (AFLAG
ECIP & EA)) MFLAG
Copy Promiscuously.

I (I (-

I

Copy Mode
00 Not Copy
Copy if (AFLAG
ECIP & EA)) & - MFLAG
ECIP & EA)) MFLAG
Copy if (AFLAG
Copy Promiscuously.

I (I (-

I

~

.-

2-306

r----------------------------------------------------------------------.c
;;g
5.0 Control Information (Continued)

Co)
I\)

en

Indicate Header Length Register (IHLR)
The Indicate Header Length Register (IHLR) defines the length (in words) of the frame header, for use with the Header/Info Sort
Mode.
The Indicate Header Length Register must be initialized before setting the Sort Mode to Headerllnfo. This register may be
changed while the INSTOP bit in the State Attention Register or the EXC bit in the Indicate Attention Register is set.
This register is not altered upon reset.
Access Rules

I

Address
19h

Read

I

Always

I

HL6

I

Write
INSTOP Mode or EXC = 1 Only

I

Register Bits
D7

I

HL7

D6

Bit

Symbol

DO-7

HLO-7

D5

I

HL5

I

D4
HL4

I

D2

D3
HL3

I

HL2

I

D1

DO

HL1

HLO

I

Description
Header Length: Specifies the length (in words) of the frame header, for use with the
Headerllnfo Sort Mode. The frame FC is written as a separate word, and thus counts as
one word. For example, to split after four bytes of header data in a frame with long
addresses, this register is programmed with the value 05 (1 word FC, 1.5 DA, 1.5 SA,
1 HDR_DATA).IHLR must not be loaded with a value less than 4. If it is, the SSI device
sets the Command Error (CMDE) and Indicate Stop (INSTOP) attentions.

2-307

UI

U)

CD
N

('I)

CO

D-

C

r---------------------------------------------------------------------------------,
5.0 Control Information (Continued)
Compare Register (CMP)
The Compare Register (CMP) is used in comparison with a write access of a conditional write register. The Compare Register is
loaded on a read of any of the conditional event Attention Registers or by directly writing to it.
All bits in this register are set to Zero upon reset.
Access Rules
Address

Read

Write

1Fh

Always

Always

Register Bits

I

D7
CMP7

I

D6
CMP6

Bit

Symbol

DO-7

CMPO-7

I

D5
CMP5

I

D4
CMP4

I

D3
CMP3

I

D2
CMP2

I

D1
CMP1

I

DO
CMPO

I

Description
Compare: These bits are compared to bits DO-7 of the accessed register, and only the
bits in the Attention Register that have the same current value as the corresponding bit in
the Compare register will be updated with the new value.

2·308

5.0 Control Information (Continued)
5.4 POINTER RAM REGISTERS
Pointer RAM Registers contain pointers to all data and DesCriptors manipulated by the SSI device, namely, Input and
Output Data Units, Input and Output Data Unit Descriptors,
Request Descriptors, Confirmation Messages, and Pool
Space Descriptors. Pointer RAM Registers are shown in Table 5-4.

Descriptors include the following:
• Input Data Unit Descriptors (IDUDs) specify the location, size, part, and status information for Input Data
Units.
• Output Data Unit DescrIptors (ODUDs) specify the location and size of Output Data Units. For multi-ODUD
frames, they also specify which part of the frame is pOinted to by the ODUD.

5.5 LIMIT RAM REGISTERS

• Pool Space DescrIptors (PSPs) describe the location
and size of a region of memory space available for writing Indicate data.

The Limit RAM Registers are used by both the Indicate and
Request machines. Limit RAM Registers contain data values that define the limits of the ten queues maintained by
the SSI device. Limit RAM Registers are shown in Table
5-5.

• Request Descriptors (REQs) describe the location of a
stream of Output Data Unit Descriptors and contain operational parameters

5.6 DESCRIPTORS
Descriptors are used to observe and control the operation
of the SSI device. They contain address, status, and control
information about Indicate and Request operations. Descriptors are stored in lists and wrap-around queues in
memory external to the SSI device and accessed via the
ASus.

• ConfirmatIon Status Messages (CNFs) describe the result of a Request operation.
5.7 OPERATING RULES
Multi-Byte Register Ordering
When referring to multi-byte fields, byte 0 is always the most
significant byte. When referring to bits within a byte, bit 7 is
the most significant bit and bit 0 is the least significant bit.
When referring to the contents of a byte, the most significant bit is always referred to first.

2-309

U) . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,

CD
C\I

C')

~

5.0 Control Information (Continued)

c

TABLE 5-4. Pointer RAM Registers
Group

P

0
N

T
E
R
R
A
M

Address

Register Name

Access Rules
Read
Write

00

ODU Pointer RCHN1 (OPR1)

Always

Always

01

ODUD List Pointer RCHN1 (OLPR1)

Always

Always

02

CNF Queue Pointer RCHN1 (CQPR1)

Always

Always

03

REQ Queue Pointer RCHN1 (RQPR1)

Always

Always

04

ODU Pointer RCHNO (OPRO)

Always

Always

05

ODUD List Pointer RCHNO (OLPRO)

Always

Always

06

CNF Queue Pointer RCHNO (CQPRO)

Always

Always

07

REQ Queue Pointer RCHNO (RQPRO)

Always

Always

08

IOU Pointer ICHN2 (lPI2)

Always

Always

09

lOUD Queue Pointer ICHN2 (IQPI2)

Always

Always

OA

PSP Queue Pointer ICHN2 (PQPI2)

Always

Always

OB

Next PSP ICHN2 (NPI2)

Always

Always

OC

IOU Pointer ICHN1 (lPI1)

Always

Always

00

lOUD Queue Pointer ICHN1 (IPQI1)

Always

Always

OE

PSP Queue Pointer ICHN1 (PQPI1)

Always

Always

OF

Next PSP ICHN1 (NPI1)

Always

Always

10

IOU Pointer ICHNO (IPIO)

Always

Always

11

lOUD Queue Pointer ICHNO (IQPIO)

Always

Always

12

PSP Queue Pointer ICHNO (PQPIO)

Always

Always

13

Next PSP ICHNO (NPIO)

Always

Always

14

lOUD Shadow Register (ISR)

Always

Always

15

ODUD Shadow Register (OSR)

Always

Always

161F

Reserved

N/A

N/A

TABLE 5-5. Limit RAM Registers
Group

Address

R
A
M

Access Rules
Read
Write

REQ Queue Limit RCHN1 (RQLR1)

Always

Always

CNF Queue Limit RCHN1 (CQLR1)

Always

Always

2

REQ Queue Limit RCHNO (RQLRO)

Always

Always

3

CNF Queue Limit RCHNO (CQLRO)

Always

Always

4

lOUD Queue Limit ICHN2 (IQLl2)

Always

Always

5

PSP Queue Limit ICHN2 (PQLl2)

Always

Always

6

lOUD Queue Limit ICHN1 (IQLl1)

Always

Always

7

PSP Queue Limit ICHN1 (PQLl1)

Always

Always

8

lOUD Queue Limit ICHf\lO (IQLlO)

Always

Always

PSP Queue Limit ICHNO (PQLlO)

Always

Always

N/A

N/A

0

L
I
M
I
T

Register Name

9

A-F

Reserved

2-310

5.0 Control Information

(Continued)
PSP Queue Pointer Register: Points to the next available
PSP. Initialized by the host with the start address of the PSP
Queue, after the Queue has been initialized with valid PSP
Descriptors. As each PSP is read from memory, this register
is loaded with the address in the Next PSP Register.
Next PSP Register: Written by the BSI device with the PSP
fetched from the PSP Queue.

5.8 POINTER RAM REGISTER DESCRIPTIONS
The Pointer RAM Register set contains 32, 28·bit registers.
Registers 23 through 31 are reserved, and user access of
these locations produces undefined results.
Pointer RAM Registers are read and written by the host
usirig the Pointer RAM Operation (PTOP) service function
and are accessed directly by BSI device hardware during
Indicate and Request operations.
During Indicate and Request operations, Pointer RAM registers are used as addresses for ABus accesses of data and
Descriptors, i.e., the subchannel addresses for loads
(reads) of streams of PSPs, ODUs, ODUDs, and REQs, and
for stores (writes) of streams of IDUs, IDUDs, and CNFs.

Indicate Shadow Register: Written by the BSI device with
the start address of the last IDU copied to memory.
Request Shadow Register: Written by the BSI device with
the address of the current ODUD.
See Table 5-4 for Summary including address and access
rules.

Pointer RAM Registers include the following:

5.9 LIMIT RAM REGISTER DESCRIPTIONS
The Limit RAM Register set contains 16, 9-bit registers.
Registers 11 through 15 are reserved, and used access of
these locations produces undefined results.
The Limit RAM registers contain data values that define the
limits of each of the ten queues maintained by the BSI device.
Limit RAM Registers are read and written by the host using
the Limit RAM Operation (LMOP) service function when the
Status/Space Machine is in STOP Mode, and are read directly by BSI device hardware during Indicate and Request
operations.
Limit RAM Registers include the following:

ODU Pointer: Contains the address of an Output Data Unit.
During Request operations, this register is loaded by the BSI
device from the Location Field of its Output Data Unit Descriptor.
ODUD List Pointer: Loaded by the BSI device from the
Location Field of the REQ Descriptor when it is read from
memory. The address is incremented by the BSI device as
each ODUD is fetched from memory.
CNF Queue Pointer: Contains the current CNF Status
Queue address. This register is written by the user after he
has allocated space for the CNF Queue. During Request
operations, this register is incremented by the BSI device
after each CNF is written to the CNF Queue.
REQ Queue Pointer: Initialized by the host with the start
address of the REQ Descriptor Queue after the Queue has
been initialized. During Request operations, the address is
incremented by the BSI device as each REQ is fetched.

REQ Queue Limit: Defines the last valid REQ written by the
host.
CNF Queue Limit Register: Defines the last Queue location where a CNF may be written by the BSI device. Due to
pipelining, the BSI device may write up to two CNFs after it
detects a write to the next-to-Iast CNF entry (and generates
a No Status Space Attention). For this reason, the host must
always define the CNF queue limit to be one Descriptor less
than the available space.

IOU Pointer: Written by the BSI device with the Location
Field of the PSP Descriptor when it is read from memory.
lOUD Queue Pointer: Points to the Queue location where
IDUDs will be stored. Written by the user after he has allocated space for the IDUD Status Queue. Incremented by
the BSI device as IDUDs are written to consecutive locations in the Queue.

lOUD Queue Limit Register: Defines the last Queue location where an IDUD may be written by the BSI device.
PSP Queue Limit: Defines the last valid PSP written by the
host.
See Table 5-5 for Summary including address and access
rules.

II

2-311

5.0 Control Information (Continued)
5.10 BSI DEVICE DESCRIPTORS
Input Data Unit Descriptor (lOUD)
Input Data Unit Descriptors (IOU Os) are generated on Indicate Channels to describe where the BSI device wrote each frame
part and to report status for the frame.
For multi.part IDUDs, intermediate status is written in each lOUD, and when a status event occurs, definitive status is written in
the last IDUO.
A detailed description of the encodings of the Indicate Status bits is given in Table 5·6.
31

29

30

28

27

IS

I

I

F-L

24
FRA

I

RES

23

I

16
FRS

15

I

VC

I

14

13
RES

12

I

LOC

0
CNT

I

WordO
Word 1

Word 0
Bit

Symbol

Description

00-12

CNT

Byte Count: Number of bytes in the SOU.

013-14

RES

Reserved

VC

VCOPY: Reflects the state of the VCOPY signal sent to the BMAC device for this
frame.
0: VCOPY was negated.
1: VCOPY was asserted.

FRS

Frame Status: This field is valid only for Full Confirmation, and if the frame ended
with an ED.

016-17

C

C Indicator:
00: none
01: R
10: S
11: T

018-19

A

A Indicator:
00: none
01: R
10: S
11: T

020-21

E

E Indicator:
00: none
01: R
10: S
11 : T

022

VFCS

Valid FCS:
0: FCS field was invalid
1: FCS field was valid

023

VOL

Valid Data Length:
0: Data length was invalid
1: Oata length was valid

015

016-23

2·312

5.0 Control Information (Continued)
5.10 BSI DEVICE DESCRIPTORS (Continued)
Input Data Unit Descriptor (IDUD) (Continued)
Word 0 (Continued)
Bit

Symbol

024-27

Description

FRA

Frame Attributes

02425

TC

Termination Condition: This field is valid only for Full Confirmation.
00: Other (e.g., MAC Reset/token).
01: ED.
10: Format error.
11: Frame stripped.

026

AFLAG

AFLAG: Reflects the state of the AFLAG input Signal, which is sampled by the BSI device at
INFORCVO.This field is valid only for Full Confirmation.
0: External OA match.
1: Internal OA match.

027

MFLAG

MFLAG: Reflects the state of the MFLG input signal, which is sampled by the BSI device at INFORCVO.
This field is valid only for Full Confirmation.
0: Frame sent by another station.
1: Frame sent by this station.

IS

Indicate Status: The values in this field are prioritized, with the highest number having the highest
priority. A detailed description of the encodings is given in Table 5-6.
153
152 151 ISO Meaning
Non-end Frame Status
0
0
0
0
Last IOU of queue, page-cross.
0
1
Page boundary crossed.
0
0
0
0
1
0
End of header.
0
0
1
1
Page-cross with header-end.
Normal-end Frame Status
0
0
0
Intermediate (no breakpoints).
1
Burst boundary.
0
1
0
1
0
1
1
0
Threshold.
1
1
Service opportunity.
0
1
Copy Abort due to No Space
1
0
0
0
No data space.
0
0
1
No header space.
1
0
Good header, info not copied.
1
0
1
Not enough info space.
1
0
1
1
Error
1
1
0
0
FIFO overrun.
0
1
Bad frame (no VOL or no VFCS).
1
1
0
Parity error.
1
1
1
Internal error.
1
1
1
1

028-31

Word 1
Bit
00-27

Symbol
LOC

Description
Location: 28-bit memory address of the start of an IOU. For the first IOU of a frame, the address is of
the fourth FC byte of the burst-aligned frame (i.e., bits [1 :0] = 11). For subsequent 10Us, the address
is of the first byte of the IOU (i.e, bits [1 :0] = 00).

028-29

RES

Reserved

030-31

F-L

First/Last Tag: Identifies the IOU object part, i.e., Only, First, Middle, or Last.

2-313

,.

5.0 Control Information (Continued)
TABLE 5-6. Indicate Status Field (IS) of IOU Descriptor
NON-END FRAME STATUS
[0000]

Last lOUD of Queue, with a Page Cross: The last available location of the ICHN's lOUD queue was written. Since there
was a page cross, there was more data to be written. Since there was no more lOUD space, the remaining data was not
written. Note that this code will not be written in a IOU. Middle, so that a Zero IS field with Zero F-L tags can be utilized by
software as a null descriptor.

[0001]

Page Cross: Must be an IDUD.FIRST or IDUD.MIDDLE. This is part of a frame that filled up the remainder of the current
page, requiring a new page for the remainder of the data.

[0010]

Header End: This refers to the last IOU of the header portion of a frame.

[0011]

Page Cross and Header End: The occurrence of a page cross and header end.

NORMAL-END FRAME STATUS
[0100]

Intermediate: A frame ended normally, and there was no breakpoint.

[0101]

Burst Boundary: A frame ended normally, and there was a breakpoint because a burst boundary was detected.

[0110]

Threshold: The copied frame threshold counter was reached when this frame was copied, and the frame ended normally.

[0111]

Service Opportunity: This (normal end) frame was preceeded by a token or MACRST, a MAC frame was received. or there
was a ring-op change. Any of these events marks a burst boundary.

NO SPACE COPY ABORT
[1000]

Insufficient Data Space: Not all the frame was copied because there was insufficient data space. This code is only written
in non-Headerllnfo Sort Mode.

[1001]

Insufficient Header Space: The frame copy was aborted because there was insufficient header space (in Headerllnfo
Sort Mode).

[1010]

Successful Header Copy, Frame Info Not Copied: There was sufficient space to copy the header, but insufficient data
space to copy info, or insufficient IOU space (on ICHN2), or both. No info was copied.

[1011]

No Info Space: The frame's header was copied. When copying the data, there was insufficient data and/or IOU space.

ERROR
[1100]

FIFO Overrun: The Indicate FIFO had an overrun while copying this frame.

[1101]

Bad Frame: The frame did not have a valid data length, or had invalid FCS, or both.

[1110]

Parity Error: There was a parity error during this frame.

[1111]

Internal Error: There was an internal logic error during this frame.

2-314

5.0 Control Information

(Continued)
The BSI device checks for the following inconsistencies
when the REO is loaded from memory:

REQ Descriptor (REQ)
Request Descriptors (REOs) contain the part, byte address,
and size of one or more Output Data Unit Descriptors. They
also contain parameters and commands to the BSI device
associated with Request operations.

1. REO.F with invalid Confirmation Class (as shown in the
Table 5-8).
2. REO. First with Request Class = O.

Multiple REO Descriptors (parts) may be grouped as one
Request Descriptor object by the host software, with the
REO. First defining the parameters for the entire Request
object. Also, multiple Output Data Unit Descriptors may be
grouped contiguously, to be described by a single REO Descriptor.

3. REO.First, when the previous REO was not a REO.Last
or REO.Only.
4. REO which is not a REO. First, when the previous REO
was a REO. Last or a REO.Only.
When an inconsistency is detected, the BSI device aborts
the Request, and reports the exception in the Request
Status field of the CNF Descriptor.

Each REO part is fetched by the BSI device from the Request Channel's REO Descriptor Oueue, using the REO
Oueue Pointer Register. Each Request Channel processes
ane Request Descriptor, per service opportunity, until a
REO. Last is encountered.
31

30

29

28

RES

I

27
UID

I

F-L

RES

I

24

The encodings of the ROCLS and CNFCLS bits are described in more detail in Tables 5-7 and 5-8 respectively.

23

I

16
SIZE

15

I

12

CNFCLS

11

I

8
ROCLS

LOC

0

7

I

FC

Word 0

I

Word 1

Word 0
Bit

Description

Symbol

00-7

FC

Frame Control: Frame control field to be used unless FC transparency is enabled. This field is
decoded to determine whether to assert ROCLM or ROBCN. This decoding is always active, i.e.,
regardless of frame control transparency. This field is also used for comparing received frames
when confirming (without FC transparency).

08-11

ROCLS

Request/Release Class: This field encodes the Request Class for the entire Request object, and is
thus only sampled on a REO.First or REO.Only. The field is asserted on the RORCLS output signals
to the BMAC device when requesting a token. If the Request Class is incompatible with the current
ring state, the BSI device sets the RCHN's USR bit in the Request Attention Register. The encoding
of this field is shown in Table 5-7.

012-15

CNFCLS

Confirmation Class: This field encodes the Confirmation Class for the entire Request object, and is
only sampled on a REO.First or REO.Only. The encoding of this field is shown in Table 5-8.

012

E

End: Enables confirmation on completion of request.
0: CNFs on completion disabled.
1: CNFs on completion enabled.

013

I

Intermediate: Enables Intermediate Confirmation.
0: Intermediate CNFs disabled.
1: Intermediate CNFs enabled.

014

F

Full/Transmitter: Selects between Transmitter and Full Confirmation.
0: Transmitter confirm.
1: Full confirm.

015

R

Repeat: Enables repeated transmission of the first frame of the request until the request is aborted.
This may be used when sending BEACON or CLAIM frames.
0: Fetch all frames of REO.
1: Repeat transmission of first frame of REO.
A Request may use Repeat on RCHN1, and have a Request loaded on RCHNO, but not vice-versa.
Specifically, when a Request with the Repeat option is loaded on RCHNO, RCHN1 must not have
any REOs active or visible to the BSI device. Thus REOs on RCHN1 may be queued externally but
the queue's Limit Register must not be set at or after that point. Requests with the Repeat option
should only be used on one Request Channel at a time, and preferably on RCHNO.

2-315

fI

5.0 Control Information (Continued)
REO Descriptor (REO) (Continued)
Word 0 (Continued)
Bit

Symbol

Description
Size: Count of number of frames represented by the ODUD stream pOinted to by LOC. REO Descriptors
with a frame count are permitted, and are typically used to end a Request, without having to send data.
For example, to end a restricted dialogue, a REO.Last with SIZE = 0 will cause the Request Machine to
command the BMAC device to capture and release the specified classes of token. The response of the
BSI device to REOs with SIZE = 0 is as follows:
1. REO. First: BSI device latches the REO DeSCriptor fields, then fetches the next REO. REORCLS is
asserted, but RORDY remains deasserted.
2. REO.Middle: BSI device fetches the next REO.
3. REO.Only: BSI device requests the capture of the appropriate token. When it is captured, the BSI
asserts ROFINAL and ends the request.
4. REO. Last: BSI device captures the token, asserts ROFINAL, then marks the req~est complete.

D16-23

SIZE

D24-29

UID

User Identification: Contains the UID field from the current REO.First or REO.Only.

D30-31

RES

Reserved

Word 1

Bit
DO-27

Symbol

Description

LOC

Location: Bits [27:2] are the memory word address of ODUD stream. Bits [1 :0] are expected to be 00,
and are not checked.

D28-29

RES

Reserved

D30-31

F-L

FlrsVLast Tag: Identifies the ODUD stream part, i.e., Only, First, Middle, or Last.

2-316

5.0 Control Information (Continued)
TABLE 5·7. REQ Descriptor Request Class Field Encodlngs
RQCLS
Value

RQCLS
Name

Class
Type

THT

Token
Capture

Token
Issue

Notes

0000

None

None

-

none

non

0001

Apr1

Async pri1

E

non-r

non-r

0010

Reserved

Reserved

0011

Reserved

Reserved

0100

Syn

Sync

D

any

capt

1

0101

Imm

Immed

D

none

none

4

0110

ImmN

Immed

D

none

non-r

4
4

0111

ImmR

Immed

D

none

restr

1000

Asyn

Async

E

non-r

non-r

1001

Rbeg

Restricted

E

non-r

restr

2,3

1010

Rend

Restricted

E

restr

non-r

2
2

1011

Rent

Restricted

E

restr

restr

1100

AsynD

Async

D

non-r

non-r

1101

RbegD

Restricted

D

non-r

restr

2,3

1110

RendD

Restricted

D

restr

non-r

2

1111

RcntD

Restricted

D

restr

restr

2

E = enabled, D = disabled, non·r = non·restricted, restr = restricted, capt = captured
Note 1: Synchronous Requests are not serviced when bit BCNR of the Ring Event Latch Register Is set.
Note 2: Restricted Requests are not serviced when bit BCNR, CLMR, or OTRMAC of the Ring Event Latch Register is set.
Note 3: Restricted Dialogues only begin when a Non-Restricted token has been received and transmitted.
Nota 4: Immediate Requests are serviced when the ring is Non-Operational. These requests are serviced from the Data state I! neither signal ROCLM nor ROBCN
is asserted. I! signal ROCLM is asserted, Immediate Requests are serviced from the Claim State. I! signal ROBCN is asserted, Immediate Requests are serviced
from the Beacon State. ROCLM and ROBCN do not cause transitions to the Claim and Beacon States.

TABLE 5·8. REQ Descriptor Confirmation Class Field Encodlngs
[R]

[F]

[I]

[E]

Confirmation Class

x
x
0
0
0

0
x
x
0
0

0
1
0
0
1

0
0
0
1
1

0
0

1
1

0
1

1
1

1
1

1
0

0
0

0
1

1

0

1

1

1

1

0

1

1

1

1

1

Invalid (conSistency failure)
Invalid (consistency failure)
None: Confirmation only on exception
Tend: Transmitter confirm, CNF on exception or completion
Tint: Transmitter confirm, CNF on exception,
completion or intermediate
Fend: Full Confirm, CNF on exception or completion
Fint: Full Confirm, CNF on exception,
completion or intermediate
NoneR: Confirmation only on exception, repeat frame
TendR: Transmitter confirm, CNF on exception
or completion, repeat frame
TintR: Transmitter confirm, CNF on exception, completion
or intermediate, repeat frame
FendR: Full confirmation, CNF on exception or
completion, repeat frame
FintR: Full Confirmation, CNF on exception,
completion, or intermediate, repeat frame

2-317

5.0 Control Information (Continued)
Output Data Unit Descriptor (ODUD)
An Output Data Unit Descriptor (ODUD) contains the part, byte address and size of an Output Data Unit. During Request
operations, ODUDs are fetched by the BSI device from a list in memory, using the address in the ODUD List Pointer Register (in
the Pointer RAM).
ODUDs may have a zero byte count, which is useful for fixed protocol stacks. One layer may be called, and if it has no data to
add to the frame, it may add an ODUD with a zero byte count to the list.
The BSI device checks for the following inconsistencies when an ODUD is loaded from memory:

1. ODUD.First, when the previous ODUD was not an ODUD.Last or ODUD.Only.
2. ODUD which is not an ODUD.First, when the previous ODUD was an ODUD.Last or ODUD.Only.
3. ODUD.First with zero byte count.
When an inconsistency is detected, the BSI device aborts the Request, and reports the exception in the Request Status field of
the CNF Descriptor.
ODUDs must contain at least 4 bytes (for short addresses).

31

30

29

28

27

I

F-L

I

RES

12

13

I

RES

I

LOC

0
Word 0

CNT

I

Word 1

Word 0
Bit

Description

Symbol

00-12

CNT

Byte Count: Number of bytes in the ODU. The size may be Zero, which is useful for fixed
protocol stacks.

013-31

RES

Reserved

Word 1
Bit

00-27

Symbol

Description
Location: Memory byte address of SOU.

LOC

028-29

RES

Reserved

030-31

F-L

First/Last Tag: Identifies the Output Data Unit part, i.e., Only, First, Middle, or Last.

,

2-318

5.0 Control Information

(Continued)

Confirmation Status Message Descriptor (CNF)
A Confirmation Status Message (CNF) describes the result of a Request operation.
A more detailed description of the encoding of the RS bits is given in Table 5-9.
31

30

29

28

27

I

RS

I

I

F-L

UID

24

23

FRA

16

15

FRS

I

FC

7

8
TFC

I

CS

0
CFC

I

RES

Word 0

I

Word 1

Word 0
Bit

Symbol

Description

DO-7

CFC

Confirmed Frame Count: Number of confirmed frames. Valid only for Full
Confirmation.

D8-15

TFC

Transmitted Frame Count: Number of frames successfully transmitted by the
BSI device and BMAC device. Valid for all confirmation classes.

D16-23

FRS

Frame Status: This field is valid only for Full Confirmation, and if the frame
ended with an ED.

D16-17

C

C Indicator:
00: None
01: R
10: S
11 : T

D18-19

A

A Indicator:
00: None
01: R
10: S
11: T

D20-21

E

E Indicator:
00: None
01: R
10: S
11: T

D22

VFCS

Valid FSC:
0: FSC Field was Invalid.
1: FSC Field was Valid.

D23

VDL

Valid Data Length:
0: Data Length was Invalid.
1: Data Length was Valid.

D24-27

FRA

Frame Attributes: This field is valid only for Full Confirmation.

TC

Terminating Condition:
00: Other (e.g., MAC Reset/token).
01: Ed.
10: Format Error.
11: Frame Stripped.

D26

AFLAG

AFLAG: Reflects the state of the AFLAG input signal, which is sampled by the
BSI device at INFORCVD.
0: No DA Match.
1: DAMatch.

D27

MFLAG

MFLAG: Reflects the state of the MFLAG input Signal, which is sampled by the
BSI device at INFORCVD.
0: Frame Sent by another Station.
1: Frame Sent by this Station.

D24-25

2-319

5.0 Control Information (Continued)
Confirmation Status Message Descriptor (CNF) (Continued)
Word 0 (Continued)
Bit

028-31

Description

Symbol
RS

Request Status: This field represents a priority encoded status value, with the highest number having the
highest priority. This field is described in Table 5-9.
Meaning
RS2
RS3
RS1
RSO
Intermediate
0
0
0
0
None
0
0
Preempted
1
0
0
0
1
0
Part Done
Breakpoints
0
0
1
1
Service Loss
0
0
1
Reserved
0
Completion
0
1
0
1
Completed BEACON
0
1
1
0
Completed OK
Exception Completion
0
1
1
1
Bad Confirmation
1
0
0
0
Underrun
1
0
1
Host Abort
0
1
0
1
0
Bad Ringop
0
1
1
1
MAC Abort
1
1
0
0
Timeout
1
1
1
MAC Reset
0
1
1
1
0
Consistency Failure
Error
1
1
1
1
Internal or Fatal ABus Error

2-320

5.0 Control Information

(Continued)

Confirmation Status Message Descriptor (CNF) (Continued)
Word 1
Bit

Symbol

00-7

RES

08-15

Description
Reserved

CS

Confirmation Status

FT

Frame Type: This field reflects the type of frame that ended Full Confirmation.
00: Any Other.
01: Token.
10: Other Void.
00: My Void.

010

F

Full Confirm: This bit is set when the Request was for Full Confirmation.

011

U

Unexpected Frame Status: This bit is set when the frame status does not
match the value programmed in the Request Expected Frame Status Register.
This applies only to Full Confirmation.

012

P

Parity: This bit is set when a parity error is detected in a received frame. Parity is
checked from FC to EO inclusive if the FLOW bit in the Mode Register is set.

013

E

Exception: This bit is set when an exception occurs. The RCHN's EXC bit in the
Request Attention Register is also set.

014

R

Ring-Op: This bit is set when the ring enters a bad operational state after
transmission but before all returning frames have been confirmed.

015

T

Transmit Class:
0: Restricted.
1:· Non-Restricted.

016-23

FC

Frame Control: Frame Control field of the last frame of the last confirmed burst,
Valid only for Full Confirmation.

024-29

UIO

User Identification: Contains the UIO field copied from the current REQ.FIRST
or REQ.ONLY.

D30-31

F-L

First/last Tag: Identifies the CNF part, i.e., Only, First, Middle, or Last.

08-9

2-321

5.0 Control Information (Continued)
TABLE 5-9. Request Status (RS) Field of CNF Descriptor
INTERMEDIATE
[0000]

None: Non status is written. This may be used by software to identify a NULL or invalid CNF.

[0001]
[0010]

Preempted: RCHN1 was preempted by RCHNO. RCHNI will be serviced following RCHNO.
Part None: The BSI device is servicing a Request, but it cannot hold onto a token, and the last frame of a
Request.part has been transmitted.

BREAKPOINTS
[0011]

Service Loss: The THT expired during a Request with THT enabled. Only occurs for Intermediate Confirmation.

[0100]

Reserved

COMPLETION
[0101]

Completed BEACON: When transmitting from the BEACON state, this status is returned when the BMAC device
receives a My_Beacon. When transmitting from the CLAIM state, this status is returned when the BMAC device
wins the CLAIM process.

[0110]

Completed OK: Normal completion with good status.

EXCEPTION COMPLETION
[0111]

Bad Confirmation: There was an error during confirmation, causing the Request to complete with this status, or one
of higher priority. Confirmation errors include MACRST, ring-operational change, receiving an Other_Void or My_
Void or token, receiving a bad frame, or receiving a frame that did not match the programmed expected frame status.

[1000]

Underrun: There was no data in the request data FIFO when it was required to be presented to the BMAC device.

[1001]

Host Abort: The host aborted the Request on this Request Channel, either directly by clearing the ABT bit in the
Service Attention Register or indirectly by having insufficient entries in the CNF queue.

[1010]

Bad Rlngop: A Request was loaded with a Request Class inappropriate for the current ring operational state.

[1011]

MAC Device Abort: The BMAC device aborted the Request and asserted TXABORT. This could be from an
interface parity error, or because the transmitted frame failed the FC check, or because the BMAC device received a
MAC frame while transmitting in the BEACON state. This status is also returned when the BMAC device receives an
Other_Beacon while the BSI device is transmitting in the BEACON state, or when the CLAIM process is lost while
the BSI device is transmitting in the CLAIM state.

[1100]

Timeout: The TRT expired during a Request with THT disabled. The Request is aborted.

[1101]

MAC Reset: The BMAC device asserted MACRST.

[1110]

Consistency Failure: There was an inconsistency within the REQ or ODUD stream.

ERROR
[1111]

Internal or Fatal ABus Error: There was an internal logic error or a fatal ABus error while writing a CNF.

2-322

C

"tJ

5.0 Control Information (Continued)

CC)

Pool Space Descriptor (PSP)

en

Co)

N

Pool Space Descriptors (PSPs) contain the address and size (in bytes) of a free space in host memory available for writing Input
Data Units. When PSPs are read by the BSI device, the address field of the PSP is loaded into the Indicate Channel's IOU
Pointer Register, and is used as the subchannel address for the IOU memory write.
31
30
29
28
27
13
12
0

I

RES

I

I

F-L

RES

I

Word 0

CNT

LOC

I

Word 1

Word 0
Bit

Symbol

Description

00-12

CNT

Byte Count: Number of bytes in the available memory area (up to 4k bytes).

013-31

RES

Reserved

Word 1
Bit

Symbol

Description

00-27

LOC

Location: Memory byte address of memory area available for writing 10Us. Normally the
page offset will be Zero to simplify space management.

030-31

RES

Reserved

2-323

CJ1

U) , - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ,

CD

C\I
C')

CD

D-

C

6.0 Signal Descriptions
6.1 PIN ORGANIZATION
The BSI device pinout is organized into five groups:
Control Interface: Used for host microprocessor access to the BSI device.
BMAC Device Indicate Interface: Pins for receiving and processing incoming frames from the DP82361 BMAC device.
BMAC Device Request Interface: Pins for transmitting frames to the BMAC device.
ABus Interface: Pins for transferring data and data information between system memory and the BSI device.
Electrical Interface: Pins associated with power supply, clocking, and scan test.

I :IL.iCR(O
2 oILERR(O
3 AU4(0)
4 .lLA3(o)

.lLAD5(VO)
AUD4(VO)
AB..AD.l(Vo)
oILAD2(I/O)

ABUS Interface

5 AIl..A2(O)

oILRYi(O)
Ai:iiEN(O)
I
10
II
12
13
14
15
18
17
18
II
20
21
22
23
24
25
21
27
28
21
30
31
32
33
34

GND

Vee

Vee
GNO

ALSIZ2(O)
ALSIZ1(0)
ALSIZO(O)
lDR(0)
.100(1)

FCRCVil(I)
MIDS(O
AfUG(1)
MFUG(I)
SAMESA(O
INroRCVD(O
SAWDNrO(Q
EDRCVD(Q
YFCS(I)

DP83265
BSI
160-PIN PQFP

VDL(Q
TKRCVD(O

ttl

tt8
tt7
ttl
tt5
tt4

oILADl(VO) m
AB...AOD(I/O) tt2
oIL8PO(I/O) Itt
CBP(I/O) ttO
CBD7(I/O) 101
CBDI(VO) 108
~I/O) 107
CB04(I/O) 108
GND 105
Vee 104
CBD3(I/O) 103
CB02(I/O) 102
CBDt(VO) 101
CBDO(I/O) 100

CBA4(Q II
CW(Q

88

CIA2(Q 17
CBAl(Q
CBAO(Q
ACK(DO)
iili(OD)

roERRoR(Q
FRSTRP(Q
VCOPY(O)
WACRST(Q
MIP(I)
WID7(Q
MI06(O
WID5(I)
WI04(O

18
15
14
15

ii(O 12
RYi(Q

II

RST(Q 10
SAT(O)
STRI'(O)
GND

81
88
87

35

"103(0

Vee

86

31

WI02(O
WID1(Q
WIDO(O

rcsr(O)
RQCLII(O)
RQ8CN(O)

85
84
83

GNO(....)

82
81

37
38

31

Vcc<....)

40

GNO(....)

MAC Request Interface

Vcc<....)

TL/F/l0791-12

FIGURE 6·1. DP83265 160·Pin Pinout

Order Number DP83265VF
See NS Package Number VF160A

2-324

6.0 Signal Descriptions (Continued)
DP83265 Pinout Description
Pin

1

Description

ABJCK

2

AB_ERR

1/0

Pin

Description

I

41

LBC1

I

42

1/0

Pin

I

81

1/0

Pin

Description

1/0

Vee

Core

121

ABJD7

I/O

Core

122

AB_BP1

I/O
I/O

Description

LBC3

I

82

GND

I

3

ABJ4

0

43

LBC5

83

RQBCN

0

123

ABJD8

4

ABJ3

0

44

GND

84

RQCLM

0

124

GND

FCST

0

125

Vee

126

ABJD9

5

ABJ2

0

45

NC

85

6

AB_RW

0

46

NC

86

7

AB_DEN

0

47

GND

87

GND

8

Vee

48

NC

88

STRIP

0

9

GND

Vee

I/O

127

ABJD10

I/O

128

ABJD11

I/O
I/O

49

ECIP

I

89

SAT

0

129

ABJD12

10

AB_SIZ2

0

50

EA

I

90

RST

I

130

ABJD13

I/O

11

AB_SIZ1

0

51

EM

I

91

RW

I

131

ABJD14

I/O

12

AB_SIZO

0

52

MRQO

0

92

CE

I

132

ABJD15

i/O

13

AB_BR

0

53

MRQ1

0

93

INT

OD

133

AB_BP2

I/O

14

AB_BG

I

54

MRQ2

0

94

ACK

OD

134

GND

15

FCRCVD

I

55

MRQ3

0

95

CBAO

I

135

Vee

16

MIDS

I

56

Vee

96

CBA1

I

136

ABJD16

I/O

17

AFLAG

I

57

GND

97

CBA2

I

137

ABJD17

I/O

18

MFLAG

I

58

MRQ4

0

98

CBA3

I

138

ABJD18

I/O

19

SAMESA

I

59

MRQ5

0

99

CBA4

I

139

ABJD19

100

CBDO

I/O

140

GND

Core
Core

I/O

20

INFORCVD

I

60

MRQ6

0

21

SAMEINFO

I

61

MRQ7

0

101

CBD1

I/O

141

Vee

22

EDRCVD

I

62

MRP

0

102

CBD2

I/O

142

ABJD20

I/O

23

VFCS

I

63

TXRINGOP

I

103

CBD3

I/O

143

ABJD21

I/O

24

VDL

I

64

TXCLASS

I

104

144

ABJD22

I/O

25

TKRCVD

I

65

TXABORT

I

105

GND

145

ABJD23

I/O

26

FOERROR

I

66

TXED

I

106

CBD4

I/O

146

GND
Vee

Vee

27

FRSTRP

I

67

MRDS

I

107

CBD5

I/O

147

28

VCOPY

0

68

TXRDY

I

108

CBD6

I/O

148

AB_BP3

I/O

CBD7

I/O

149

ABJD24

I/O
I/O

29

MACRST

I

69

TXPASS

I

109

30

MIP

I

70

RQABORT

0

110

CBP

I/O

150

ABJD25

31

MID7

I

71

RQFINAL

0

111

AB_BPO

I/O

151

ABJD26

I/O

32

MID6

I

72

RQEOF

0

112

ABJDO

I/O

152

ABJD27

I/O

33

MID5

I

73

RQSEND

0

113

ABJD1

I/O

153

ABJD28

I/O

34

MID4

I

74

Vee

114

Vee

154

ABJD29

I/O

35

MID3

I

75

GND

115

GND

155

ABJD30

I/O

36

MID2

I

76

RQRDY

0

116

ABJD2

I/O

156

GND

37

MID1

I

77

RQRCLSO

0

117

ABJD3

I/O

157

Vee

38

MIDO

I

78

RQRCLS1

0

118

ABJD4

I/O

158

ABJD31

I/O

39

Vee

Core

79

RQRCLS2

0

119

ABJD5

I/O

159

ABJB

I/O

40

GND

Core

80

RQRCLS3

0

120

ABJD6

I/O

160

AB_CLK

I/O

2-325

6.0 Signal Descriptions (Continued)
6.2 CONTROL INTERFACE
The Control Interface operates asynchronously to the operation of the BMAC device and ABus interfaces.
The ACK and TfiI'j' signals are open drain to allow wire ORing.
Symbol

Pin #

1/0

Description

110

1/0

Control Bus Parity: Odd parity on CBD7 -0.

CBD7-0

109-106,
103-100

I/O

Control Bus Data: Bidirectional Data bus.

CBA4-0

99-95

I

Control Bus Address: Address of a particular BSI device register.

CE

92

I

Control Bus Enable: Handshake signal used to begin a Control
Interface access. Active low signal.

R/W

91

I

Read/Write: Determines current direction of a Control Interface
access.

ACK

94

00

Acknowledge: Acknowledges that the Control Interface access has
been performed. Active low, open drain signal.

INT

93

00

Interrupt: Indicates presence of one or more enabled conditions.
Active low, open drain signal.

RST

90

I

Reset: Causes a reset of BSI device state machines and registers.

CBP

2-326

6.0 Signal Descriptions (Continued)
6.3 BMAC Device Indicate Interface
The BMAC Device Indicate Interface signals provide data and control bytes as received from the BMAC device. Each Indicate
Data byte is also provided with odd parity.
MID7-0 signals are valid on the rising edge of the Local Byte Clock signal (provided by the Clock Recovery Device).
Data:
Symbol
MIP

MID7-0

Pin #

I/O

Description

30

I

MAC Indicate Parity: This is connected directly to the corresponding BMAC device
pin of similar name. Odd parity on MID7-0. Only valid with Data and Status
indicators.

31-38

I

MAC Indicate Data: This is connected directly to the corresponding BMAC device
pin of similar name.
Data: The BMAC device indicates data is being presented on MID7 -0 during the
time when RCSTART is asserted until one of the following Signals is asserted:
EDRCVD, TKRCVD, FOERROR, or MACRST.
Status: The BMAC device indicates Status Indicators are being presented on
MID7 -0 when EDRCVD or TKRCVD is asserted.

,

Frame Sequencing:
The Frame Sequencing Signals apply to the data available at the MAC Indicate Interface (MIP and MID7-0). The Frame
Sequencing signals can be used to control the latching of appropriate Frame Status.
Pln#

I/O

Description

FCRCVD

15

I

Frame Control Received: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates that the Frame Control Field
has been received.

INFORCVD

20

I

Information Field Received: This is connected directly to the corresponding
BMAC device pin of similar name. The BMAC device indicates that four bytes of the
Information Field have been received. It is asserted by the BMAC device on the
fourth byte of the INFO field and remains active until the next JK symbol pair is
received.

EDRCVD

22

I

EDFS Received: This is connected directly to the corresponding BMAC device pin
of similar name. The BMAC device indicates that the End of Frame Sequence has
been received.

MIDS

16

I

MAC Indicate Data Strobe: Asserted by BMAC device to indicate valid data. This
signal should be tied to Vee for FDDI-I, and used for FDDI-II.

Symbol

Frame Information:
Pin #

I/O

AFLAG

17

I

My Destination Address Recognized: This is connected directly to the
corresponding BMAC device pin of similar name. The BMAC device indicates that
an internal address match occurred on the Destination Address field. It is reset
when the next JK symbol pair is received.

MFLAG

18

I

My Source Address Recognized: This is connected directly to the corresponding
BMAC device pin of similar name. The BMAC device indicates that the received
Source Address field matched the MLA or MSA BMAC device registers. It is reset
when the next JK symbol pair is received.

SAMESA

19

I

Same Source Address: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates that the SA of the current
frame is the same as the previous frame, that the frames were not MAC frames, and
that the frames are the same size. It is reset when the next KJ symbol pair is
received.

SAMEINFO

21

I

Same MAC Information: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates that the first four bytes of
the IF of the current frame are the same as the previous frame, that the frames were
MAC frames, and that their address lengths are the same. SAMEINFO is asserted
along with INFORCVD. It is reset when the next JK symbol pair is received.

Symbol

Description

2-327

6.0 Signal Descriptions (Continued)
Frame Status:
Pin #

I/O

VOL

24

I

Valid Data Length: The BMAC device indicates a valid data length for the current
frame.

VFCS

23

I

Valid Frame Check Sequence: The BMAC device indicates a valid FCS for the
current frame.

TKRCVD

25

I

Token Received: The BMAC device indicates that a complete token was received.

FRSTRP

27

I

Frame Stripped: The BMAC device indicates that the current frame was stripped.

FOERROR

26

I

Format Error: The BMAC device indicates a standard-defined format error.

MACRST

29

I

MAC Reset: The BMAC device indicates an internal error, MAC frame, MAC reset,
or hardware or software reset.

EA

50

I

External AFlag: This signal is used by external address matching to signal that a
Destination Address (DA) match has occurred. Assuming that the proper timing of
EA and ECIP are met, the assertion of EA will cause the BSI device to copy this
frame. EA is sampled on the cycle after ECIP is deasserted. The sample window is
from FCRCVD to EDRCVD.

EM

51

I

External MFlag: This signal is used by external address matching logic to signal a
Source Address (SA) match. II is sampled on the clock cycle after ECIP is
deasserted.

VCOpy

28

0

Valid Copy: Affects the setting of the transmitted ex (Copied Indicator).
The value of VCOPY is used to determine the value of the transmitted Cx. VCOPY
must be asserted one byte time before EDRCVD is asserted.

ECIP

49

I

External Compare In Progress: This signal is asserted to indicate that external
address comparison has begun. II is deasserted to indicate that the comparison has
completed. EA and EM are sampled upon the deassertion of ECIP. ECIP must be
asserted during the period from the assertion of FCRVCD (by the BMAC device) to
the assertion of INFORCVD (by the BMAC device) in order for the BSI to recognize
an external comparison. II must be deasserted for at least one cycle for the external
comparison to complete. If ECIP has not been deasserted before EDRCVD (from
the BMAC device), the BSI device will not copy this frame. ECIP may be
implemented as a positive or negative pulse.

Symbol

Description

2-328

6.0 Signal Descriptions (Continued)
6.4 BMAC Device Request Interface
The BMAC Device Request Interface signals provide data and control bytes to the BMAC device as received from the Host
System. Each Request Data byte is also provided with odd parity.
Symbol
MRP
MRD7-0

Pin #

I/O

Description

62

0

MAC Request Parity: This is connected directly to the corresponding BMAC device
pin of similar name. Odd parity on MRD7 -0.

61-58,

0

MAC Request Data: This is connected directly to the corresponding BMAC device
pin of similar name. The BMAC device Indicates data is being presented on
MRD7-0.

55-52
Service Parameters:
Symbol

Pin #

I/O

Description

RQRCLS3-0

80-77

0

Request Class: This is connected directly to the corresponding BMAC device pin of
similar name. The BMAC device Indicates the service class parameters for this
request. When RQRCLS > 0, the BMAC device Transmitter will capture a usable
token for non-immediate requests) and assert TXRDY. The service opportunity
continues as long as the token is usable with the current service parameters, even if
RQRDY is not asserted. When RQRCLS = 0, the service opportunity will terminate
aiter the current frame (even if RQRCLS subsequently becomes non-Zero).

RQCLM

84

0

Request CLAIM: This is connected directly to the corresponding BMAC device pin
of similar name. The BMAC device indicates that this request is to be serviced in the
Transmit CLAIM state. Ignored for non-immediate requests.

RQCBN

83

0

Request BEACON: This is connected directly to the corresponding BMAC device
pin of similar name. The BMAC device Indicates that this request Is to be serviced in
the Transmit BEACON state. Ignored for non-Immediate requests.

2-329

6.0 Signal Descriptions (Continued)
Frame Options:
Pin #

1/0

STRIP

88

0

Void Strip: Connected to STRIP and possibly SAT on the BMAC device.

SAT

89

0

Source Address Transparency: Connected to SAIGT on the BMAC device and to
SAT on the BMAC device if STRIP is not:

FCST

85

0

Frame Check Sequence Transparency: This is connected directly to the
corresponding BMAC device pin of similar name. When selected. the BMAC device
will not append FCS to the end of the Information field.

Symbol

Description

Request Handshake:
Symbol

Pin #

110

Description

TXPASS

69

I

Transmit Pass: This is connected directly to the.corresponding BMAC device pin of
similar name. The BMAC device indicates the absence of a service opportunity. This
could result from an unusable request class. waiting for a token. timer expiration. or
MAC Reset. TXPASS is always asserted between service opportunities. It is
deasserted when TXRDY is asserted at the beginning of a service opportunity.

TXRDY

68

I

Transmit Ready: This is connected directly to the corresponding BMAC device pin
of similar name. The BMAC device indicates that the BMAC device transmitter is
ready for another frame. For a non-immediate request. a useable token must be
held in order to transmit frames.
TXRDY is asserted by the BMAC device when:
a. a usable token is being held. or
b. an immediate request becomes serviceable. or
c. after frame transmission if the current service opportunity is still usable for
another frame.
TXRDY is deasserted when TXPASS or TXACK is asserted.

RORDY

76

0

Request Ready: This is connected directly to the corresponding BMAC device pin
of similar name. The BMAC device indicates that the BMAC device transmitter
should attempt to use a service opportunity.
If RORDY is asserted within 6 byte times after TXRDY is asserted. the BMAC device
transmitter will wait at least LMax plus one Void frame (4.16 ms - 4.80 ms) for
ROSEND to be asserted before releasing the token.

ROSEND

73

0

Request Send: This is connected directly to the corresponding BMAC device pin of
similar name. The BMAC device indicates that the BMAC device transmitter should
send the next frame. The MRD7-0 signals convey the FC byte when this signal is
asserted.
If ROSEND is asserted within 6 byte times after TXRDY is asserted. the BMAC
device transmitter will send the frame with a minimum length preamble. If ROSEND
is not asserted within LMax plus one Void frame after RORDY has been asserted
(4.16 ms - 4.60 ms). the token may become unusable due to timer expiration.
ROSEND may only be asserted when TXRDY and RORDY are asserted and
ROFINAL is deasserted.
ROSEND must be deasserted not later than one byte time after TXRDY is
deasserted

MRDS

67

I

MAC Request Data Strobe: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates that data on MRD7 -0 is
valid. This signal should be connected to the TXACK on the BMAC device.

ROEOF

72

0

Request EOF: This is connected directly to the corresponding BMAC device pin of
similar name. The BMAC device indicates that MRD7 -0 conveys the last data byte
when asserted. Normally. this is the last byte of the INFO field of the frame
(exceptions: FCS transparency. invalid frame length).
ROEOF causes TXACK to be deasserted and is ignored when TXACK is not
asserted.

2-330

6.0 Signal Descriptions (Continued)
Request Handshake: (Continued)
Symbol

Pin #

1/0

Description

ROABORT

70

0

Request Abort: This is connected directly to the corresponding BMAC device pin of
similar name. The BMAC device indicates that the current frame should be aborted.
Normally this causes the BMAC device transmitter to generate a Void, CLAIM, or
BEACON frame.
ROABORT causes TXACK to be deasserted and is ignored when TXACK is not
asserted.

ROFINAL

71

0

Request Final: This is connected directly to the corresponding BMAC device pin of
similar name. The BMAC device indicates that the final frame of the request has
been presented to the BMAC device Interface.
When asserted, the Issue Token Class (as opposed to the Capture Token Class)
becomes the new Token Class (TXCLASS). ROFINAL may only be asserted when
RORDY is asserted and ROSEND is deasserted. ROFINAL is ignored unless
RORDY has been asserted for at least one byte time and the service parameters
have been valid for at least three byte times.
ROFINAL must be deasserted not later than two byte times after TXPASS is
deasserted.

TXED

66

I

Transmit End Delimiter: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates that the ED is being
transmitted.

TXABORT

65

I

Transmit Abort: This is connected directly to the corresponding BMAC device pin
of similar name. The BMAC device indicates that the MAC Transmitter aborted the
current frame.

Symbol

Pin #

1/0

Description

TXRINGOP

63

I

Transmit Ring Operational: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates the state of the MAC
Transmitter.

TXCLASS

64

I

Transmit Token Class: This is connected directly to the corresponding BMAC
device pin of similar name. The BMAC device indicates the class of the current
token.

Transmit Status:

•
2-331

U) r-----------------------------------------------------------------------~------__,

~
C")
co

~

6.0 Signal Descriptions (Continued)
6.5 ABus Interface
The ABus Interface signals provide a 32-bit multiplexed address/data bus for transfers between the host system and the BSI
device. The ABus uses a bus request/bus grant protocol that allows for multiple bus masters, supports burst transfers of 4 or 8
32-biI words, and permits both physical and virtual addressing using fixed-size pages.
Address and Data:
Symbol

Pin #

I/O

AB_BP3-0

148,133,
122,111

110

ABus Byte Parity: These TRI-STATE signals contain the BSI device-generated parity
for each address byte of ABJD, such that AB_BPO is the parity for ABJD7 -0,
AB_BP1 is the parity for ABJD15-B, etc.

ABJD31-0

15B,
155-149,
145-142,
139-136,
132-126,
123,
121-116,
113-112

110

ABus Address and Data: These TRI-STATE signals are the multiplexed ABus address
and data lines. During the address phase of a cycle, ABJD27 -0 contain the 28-bit
address, and ABJD31-28 contain a 4-bit function code identifying the type of
transaction, encoded as follows:
ABJD[31:28]
Transaction Type
o
RSAP1 ODU Load
1
RSAP1 ODUD Load/CNF Store
RSAP1 REO Load
2
RSAPO ODU Load
3
4
RSAPO ODUD Load/CNF Store
RSAPO REO Load
5
ISAP2 IDU Store
6
ISAP2 IDUD Store
7
ISAP2 PSP Load
B
ISAP1 IDU Store
9
ISAP1 IDUD Store
A
B
ISAP1 PSP Load
C
ISAPO IDU Store
D
ISAPO IDUD Store
ISAPO PSP Load
E
PTR RAM Load/Store
F

3-5

o

ABus Burst Address: These TRI-STATE signals contain the word address during burstmode accesses. They are driven from Tpa to the last Td state, negated in the following
Tr state, then released. Note that the address presented allows external pipelinlng for
optimum memory timing.

ABJ4-2

Description

2-332

6.0 Signal Descriptions (Continued)
Bus Control:
Symbol
ABJS

Pin # I/O
159

Description

0 ABus Address Strobe: When asserted, This TRI-STATE signal indicates that data on ABJD is valid.
When this signal is inactive and ABJCK is asserted, the next cycle is a Tr state, in which the bus arbiter
can sample all bus requests, then issue a bus grant in the following cycle.

AB_RW

6

0 ABus Read/Write: This TRI-STATE signal determines the current direction of an ABus access.

AB_DEN

7

0 ABus Data Enable: This TRI-STATE signal indicates that data on ABJD31-0 is valid.

AB_SIZ2-0 10-12 0

ABus Size: These TRI-STATE signals indicate the size of the transfer on ABJD31-0, encoded as
follows:
Transfer
AB_SIZO
AB_SIZ2
AB_SIZ1
Size
4 Bytes
0
0
0
Reserved
0
0
1
Reserved
1
0
0
1
Reserved
0
1
16 Bytes
0
1
0
1
32 Bytes
1
0
0
Reserved
1
1
Reserved
1
1
1

ABJCK

1

I

ABus Acknowledge: Indicates a bus slave's response to a bus master. The meaning of this signal
depends on the state of ABus Error (AB_ERR), as described below.

AB_ERR

2

I

ABus Error: This signal is asserted by a bus slave to cause a transaction retry or transaction abort.
Together with ABJCK, the encoding is as follows:
AB_ERR
AB-ACK
Definition
1
1
Insert Wait States
Bus Error
1
0
Transaction Retry
0
0
Acknowledge
0
1

Bus Arbitration:
Symbol

Pin #

I/O

Description

AB_BR

13

0

ABus Bus Request: This signal is used by a bus master to request use of the ABus.

AB_BG

14

I

ABus Bus Grant: This signal is asserted by external bus arbitration logiC to grant
use of the ABus to the BSI device. When AB_BG is deasserted, the BSI device
completes the current transaction and releases the bus. If AB_BG is asserted at
the start of a transaction (Tbr), the BSI device will run a transaction.

AB_ClK

160

I

ABus Clock: All ABus operations are synchronized to the rising edge of AB_ClK.

•
2-333

6.0 Signal Descriptions (Continued)
6.6 ELECTRICAL INTERFACE
Symbol

Pin #

I/O

LBC5, 3, 1

43-41

I

Description
Local Byte Clock: 12.5 MHz clock with a 60/40 duty-cycle. Generated by CDD.

Vccl13)

8,39,56
74,81,86,
104,114,
125,135,
141,147,157

Positive Power Supply: 5V, ± 100/0 relative to GND.

GND[13)

9,40,57
75,82,87,
105,115,124,
134,140,146,
156

Power Supply Return.

GND
NC

44,47
45,46,48

Must be grounded.
No Connect: Must be left unconnected.

2-334

Section 3
Development Support

Ell

Section 3 Contents
OP83200EB FOOl AT Evaluation Kit...... ........... ..... ........... .... .............
OP83200SMT XLNT Manager FOOl Station Management (SMT) Software Support Package.

3-2

3-3
3-15

C

"tI

co

~National

W

~

~ Semiconductor
OP83200EB
FOOl AT Evaluation Kit

o

m

til

General Description
The OP83200EB FOOl is a complete design/evaluation kit
(using an AT or compatible platform), that includes hardware, software and application documentation, to implement a single node compliant with an ANSI X3T9.5 FOOl
network. The kit has been designed to demonstrate the capabilities of National Semiconductor's FOOl chip set.

The DP83200EB can be combined with a OP83200EK Kit to
create a dual attach station. The OP83200EK Kit contains
the additional Link card (PHY Layer) and appropriate cables.

It contains a Link card and MAC card, that together implement one FOOl Single Attach node.
The Evaluation Boards allow evaluation of the many capabilities of the chip set and serve as an educational tool for
customers deSigning products with the FOOl chip set. High
performance as a goal was sacrificed at the expense of
simplicity and accessibility. There are many laboratories
around the world with a spare IBM® PC® or compatible.

• System modularity supports single attachment or dual
attachment
• Utilizes a PC-AT® compatible form factor
• Built-in diagnostic capability for fault detection
• Supports an external optical bypass switch
• Supports asynchronous and synchronous transmission
classes
II PAL based buffer management
III Supported by demonstration and diagnostic software
III Board schematics

Features

These boards allow users to experiment and gain experience with the FOOl chip set in order to unleash its capabilities in their own products.

II
3-3

m

w
oo

N

CO)

CO

a.
C

TLlF/11122-2

SAS Configuration

TLlF/III22-3

DAS Configuration

FIGURE 1. Single attach and optional dual attach configuration
3-4

IC
"tJ

1.0 Link Card

CI)

• System modularity supports single attachment or dual
attachment configurations.
• Utilizes a PC-AT compatible form factor
• Built-in diagnostic capability for fault detection
• Supports an external optical bypass switch
• Power consumption is 1.5 amps typical per Link Card

1.1 Link Card Description
The Link Card is intended for evaluation of the following
three National Semiconductor devices which implement the
FOOl Physical Layer and clock distribution.
DPB3255 Physical Layer Controller (PLAYERTM device)
DPB3241 Clock Distribution Device (CDDTM device)
DPB3231 Clock Recovery Device (CRDTM device)

2.0 Link Card System Description
2.1 Block Diagram Description

The design goal of the Link Card was to allow the user to
exercise the Physical Layer devices and COD device. The
Link Card can be used in tandem with the DPB3291 EB MAC
Card (see Section 2.3). A Link Card connected to a single
MAC Card inplements a single attachment station. Dual attachment stations require two Link Cards. The Link Card
requires a PC-AT compatible machine which is a readily
available platform capable of supporting an FOOl application.

The Link Card block diagram is composed of the following
seven blocks:
1. AT Bus Interface
2. Clock Bus Interface
3. Clock Distribution Device (COD device)
4. Clock Recovery Device (CRD device)
5. Link Bus Interface

1.2 Link Card Features

6. Physical Layer Controller (PLAYER device)

The Link Card offers many features to provide a flexible and
convenient evaluation platform:
• Utilizes the National FOOl Chip Set
DP83255 PLAYER Device
DP83241 COD Device
DP83231 CRD Device

7. Transceiver Interface

Figure 2 is a detailed representation of the block diagram .

3-5

W

I'.)

o
o

m
m

lEI

UJ

~

2.0 Link Card System Description

C')

EXTERNAL
CONNECTORS

co

a.

(Continued)

liNK CARD
INTERFACE

'~--+

C

--+

CLOCK
BUS

...z~
":~ r-

A PORT

...

B PORT

CDDClK 12.5 +
CDDClK 12.5-

CDDClK 12.5

DS3695
TRANSCEIVER

A PORT INDICATE

0

>=

LINK

_

U

'::>!;;:

Y

10

-244

' 10

'L::'
'::>!;;:
::E
0

b'"
t;;

3

--+
lA ADDR

"-

841

MAC CTl

0

'"u0
..J

,S!
B PORT REQUEST

u

,L

B PORT INDICATE

BUS

'":::>
;;:
"z

.r;;l

A PORT REQUEST

"S!

....

SA ADDR

"t::

DATA

co

AT CTl

"....

IRQ

"....

AT DATA

co

AT ADDR

,on"

u

PLAYER DP83255
PHYSICAL lAYER CONTROllER

-,....

AT CTl
AT
BUS

...'"
'"

..J

,

u

lBC

DIAG PE

-

'"<><>

TBC

N

TXC

N

COD DP83241
CLOCK
DISTRIBUTION
DEVICE

..J

0

'"

t;;

f:l

'"<>

~
'"..J

'"'"...

Q

<>

<>

D..

>-

'"
..J

..J

'"

x

'"

<>

U

<>

x

t;

2

~

:5
U

III

u

u

5

2

lZ
0

'"

if

2

, 2 ' 2

...
U

~

>=
D..

- RJ-45
PHONE
JACK

CRD DP83231
CLOCK
RECOVERY
DEVICE

0

I+-

75452
DRIVER

...

~

Q

'"

!;;:

Q

...~

C

i
!

l.-

2

ELECTRICAL
(ELECTRONS)

I.2

x
l-

RX OUT EN
FIBER OPTIC
TRANSCEIVER

OPTICAL (PHOTONS)

TO FIBER OPTIC RING

!l

;::!

...

c

~

TlIF111122-4

FIGURE 2. Link Card Block Diagram

3·6

C

2.0 Link Card System Description (Continued)

"a
00
Co:!

N

2.2 AT Interface Block
The function of the AT Interface Block is to interface the
Link Card with the AT host. This block features a full 24-bit
address bus for flexible Link Card memory map placement.
The data bus is B bits wide which is adequate for this demo
platform. Bits B through 15 are not used on the base Link
Card, but they have been tapped to test points on the board.
The test pOints are included in the event that an application
requires a 16-bit data bus. In addition to the address and
data buses, seven AT bus interrupts and the necessary control signals are included. All address and data signal lines
are buffered with independent parity generation supplied for
the data bus.

2.5 CRD Device Block
The Clock Recovery Device has been designed for use in
this FDDI implementation. The device receives serial data
from a Fiber Optic Receiver (FORX) in differential ECl NRZI
4B/5B group code format and outputs resynchronized NRZI
received data and a 125 MHz received clock in differential
ECl format for use by the PLAYER device.
2.6 link Bus Block
The function of the Link Bus is to provide a data path between the Link and MAC Cards that form an FDDI station.
Each connection contains two 10-bit data buses (Indicate
and Request) and station configuration signals. The pinout
of the Link Bus has been designed to allow the user to build
Single Attachment and Dual Attachment/Single MAC configurations. To build one of these configurations, the user
must simply connect the cabling in the manner shown in
Appendix E of the User's Guide.
Every otlier write in the Link Bus is grounded to insure data
integrity. This cabling scheme has been tested for resistance to data corruption induced by crosstalk.

The AT bus block is the 50/e power supply for the link Card.
The address decoding scheme is accomplished with generic array logic devices (GAls). Equations for each of the four
GAL devices are included in Appendix G of the DPB3290EB
FDDI Physical layer Evaluation Board User's Guide.
Beyond these basic functions, the AT Interface offers a
number of modes such as autoconfiguration, base register
area select, and memory map configuration.
2.3 Clock Bus Block
The Clock Bus Block is included in the Link Card design to
provide a physical bus among all Link and MAC Cards that
form a station. The consruction of the bus is a twenty pin
ribbon cable capable of supporting 9 Signals. Each Signal is
surrounded on either side by a ground line to reduce crosstalk.

2.7 PLAYER Device Block
The Physical layer Controller is a part of National Semiconductor's FDDI Chip Set. It implements one Physical layer
entity as defined by the ANSI X3T9.5 PHY standard. The
PLAYER device performs the 4B/5B encoding and decoding, serialization and deserialization of data, repeat filter,
and line state control and detection. It also contains a configuration switch. The PLAYER device supports many types
of station configurations as allowed by the standard.

2.4 COD Device Block
The Clock Distribution Device is a clock generation and distribution device intended for use in FDDI networks. The device provides the complete set of clocks required to convert
byte wide data to serial format for fiber medium transmission and to move byte wide data between the PLAYER and
BMAC devices in various station configurations. 12.5 MHz
and 125 MHz differential ECl clocks are generated for the
conversion of data to serial format and 12.5 MHz and
125 MHz TIL clocks are generated for the byte wide data
transfers.

Although tailored to the FDDI specification, the PLAYER device is also well suited for use in high speed pOint-to-point
communication links over optical fibers and coaxial cable.
2.8 Transceiver Block
The transceiver block consists of two parts: fiber optic receiver and fiber optiC transmitter. The Link Card supports
the following FDDI optical transceiver modules:
AT&T ODl 125 Lightwave Data Links
Sumitomo DM-742 1300nm Data Link
Any Transceiver pair which supports the
AT&T footprint 2.1.B.1 pin format
composed of 2 independent 16·pin DIP (footprints)
See Appendix A of the User's Guide for a detailed footprint
description.

3-7

o
o
m

m

m
W

g

r-------------------------------------------------------------------------~

2.0 Link Card System Description

(Continued)

N

C')

~

2.9 Installation

A.1.1 Setup

ON
orr

ON

ADDRESS SET TO OCCOO
ChAP - ENABLED
SEL - DISABLED
hAAP - DISABLED

orr

ON
INTERRUPTS DISABLED
orr

SELECT REr IN rOR COD DEVICE

SELECT INTERNAL VCO rOR COD DEVICE

SELECT 8 ns LBC SKEW rOR COD' DEVICE
PLYRa

13~

+----

SELECT LBC3 rOR PLAYER LBC

II

~
r

L1
L2
L3

SELECT LBCI rOR AT I/r

~~

TL/F/11122-5

3·8

C

."

2.0 Link Card System Description (Continued)

CI)

~
o
o
m

A.1.1 Setup (Continued)

m

NO

CK
NO

SELECT CLOCKED t.40DE
FOR REQUEST DATA
LATCHES

INSURE PROPER PART SEATING AND
PLACEt.4ENT

il

TL/F/11122-6

3·9

m
w
<:)
<:)
('II
C')

co

D..
Q

3.0 MAC Card
3.1 MAC CARD DESCRIPTION

3.3 MAC CARD SYSTEM DESCRIPTION

The DP83291 EB FDDI MAC Layer Evaluation Board is a
PC-AT compatible board that implements the MAC Layer
functions of the FDDI standard. The Board utilizes the National Semiconductor DP83261 BMACTM device along with
PAL®-based Buffer Management Logic to implement a simple MAC Layer.

The MAC Evaluation Board is designed to perform simple
transmission and reception scenarios. One 8k and 8 Static
RAM is used for Transmission and another is used for Reception and Status. See Figure 3 for a detailed block diagram.
On Transmission, the Transmission Counter is used to address the TlL-RAM where the frames to be transmitted are
written. The Transmit Sequencer controls the sequencing of
frames across the BMAC device's MAC Request Interface.

3.2 MAC CARD FEATURES
The MAC card offers many features on a convenient platform:
• PC-AT compatible full size card

On Reception, the Receive Sequencer controls the sequencing of frames across the BMAC device's MAC indicate interface. Transmit and Receive Status is stored and
multiplexed into the RlL-RAM between frames. The Receive Counter is used to address the RlL-RAM. The Receive Counter is under the control of the Receive Sequencer. The Copy PAL monitors the addressing information
across the BMAC device and determines whether to continue to copy frames. This is signaled to the Receive Sequencer which then adjusts the Receive Counter accordingly.

• Dual ported memory interface-full duplex data path
• Interfaces to link cards for DAS or SAS configurations
• Supported by demonstration software
• Utilizes DP83261 BMAC device
• Full network statistics
• Supports asynchronous and synchronous transmission
classes
• PAL based buffer management

PCJDDRESS

BMAC
COD

TL/F/11122-7

FIGURE 3. MAC Card Block Diagram

3-10

,----------------------------------------------------------------------, c

;g

3.0 MAC Card (Continued)
The Tx-RAM contains either one maximum size frame or
up to 16 frames of 512 bytes or less. The Rx-RAM may be
filled with up to B frames.

o
o
m

1000-3FFF reserved for future use

tD

See Figure 4.

The DPB570A is used as a timer on this board and provides
support for Station Management. Its registers are accessed
via the PC interface and is memory mapped.

MAC Registers
OOOO-OOFF BMAC Device Registers
0100-01FF Board Registers

The PC interface provides access to the Transmit and Receive RAM in addition to the Board Registers and BMAC
device. The Board Registers include a Mode, Function and
Status Register.

BMAC Device Registers
The BMAC Device Registers are mapped directly into the
64k segment of the address space as defined in the BMAC
Device Datasheet.

3.4 ADDRESS MAPPING
PC BUS INTERFACE

MAC Evaluation Board Registers
The board registers are mapped into the 64k segment of the
address space as:
0100 Mode Register
0140 Function Register
01 BO Status Register
01AO Timer Registers
01 CO Board Reset

Board Address Mapping
The Evaluation Board Control Bus is mapped into a 64k
segment within the lowest 1M of the PC address space. The
64k offset is selected (by a jumper) as shown below:
Sel = 0
Sel = 1

(,)
I\)

0400-0FFF reserved for future use

offset is COOOO
offset is 00000

64k Segment Mapping

Note: For MACI add 200lh 10 each address.

The 64k segment reserved for the evaluation board is divided as shown below:
0000-3FFF Used for control registers (See Figure 3)
4000-7FFF reserved
BOOO-9FFF used to access Bk Tx-RAM
AOOO-BFFF shadow to Tx-RAM
COOO-DFFF used to access Bk Rx-RAM
EOOO-FFFF shadow of Rx-RAM
Board Register Address Mapping
The address space used for control registers is divided into
512 byte pages for each PHY or MAC. The MAC is selectable as either MAC 0 or MAC 1.
0000-01 FF MACO
0200-03FF MAC1

BMAC 0 REGISTERS

OOOO-OOFF

BOARD 0 REGISTERS

00FF-01FF

BMAC 1 REGISTERS

0200-02FF

BOARD 1 REGISTERS

0300-03FF

RESERVED

0400-0FFF

RESERVED

1000-3FFF

RESERVED

4000-7FFF

TXRAM

BOOO-9FFF

SHADOW TX RAM

AOOO-BFFF

RXRAM

COOO-DFFF

SHADOW RX RAM

EOOO-FFFF

FIGURE 4. Board Address Map

•
3-11

III
W

g

3.0 MAC Card

~

3.5 MAC Board Installation
The MAC Card requires a full length slot. It can be installed
in either an AT or XT slot. There are several options that
can be programmed via jumpers provided on the MAC Card.
The position of the jumpers on the board are shown in
Figure 5.

~
C

(Continued)
Interrupts

·m
10

• • • • • • • •
• • • • • • • • • i~
• • • • • • • • • •

JUMPER SETTINGS

10

J1: Base Address, MA~ Select, Interrupt and Option Selection
J1 is used to select the Base Address of the MAC Card,
MAC Number. interrupt to be used for the interconnected
MAC and Link Cards and Option Selections on the BMAC
device. The possible settings and factory defaults follow.

• • • • • • • • • •
• • • • • • • •
........
:
• • • • • • • •

.jl
· ..

IRQ4

'

10

Iff·.

• • • • • • • •
• • • • • • • • :;~
• • • • • • • • • •

10

OPTION
SELECT

IRQ3

rt ~

IRQ5

10

• • • • • • • • • •
• • • • • • • •
• • • • • • • • :'.':,

m·.

INTERRUPT SELECT
L._- - - - B A S E AOORESS SELECT
L . . . - - - - - M A C SELECT

TLlF/11122-B

Factory Default Shown

IRQ6

TL/F/11122-9

Factory Default = IRQ4
MAC Select
10

• • • • • •
• • • • • •
• • • • • •

• • •
• • •
• • •

• • • • • •
• • • • • •
• • • • • •

• • •
• • •
• • •

t.tACO

10

MACI

TLlF/11122-10

Factory Default = MACO
J5

TL/F111122-11

FIGURE 5. MAC Card Jumper Locations

3·12

3.0 MAC Card

c"'tI
CD
W

(Continued)

N

Base Address Select

0
0

2

3

4

5

6

8

• • • • • • • • • •
• • • • • • •
• •
• • • • • • •
• •
2

4

m

m

10

5

BOARD BASE=DOOO

10

• •
• • • • • • •
• • • • • • •
• •
• • • • • • • • • •

BOARD BASE=COOO

TL/F/11122-12

Factory Default

=

DODO

Options Selection
7

8

10

• • • •
• • • •
• • • •
7

8

9

10

• • • •
• • • •
• • • •
7

8

9

SAIGT, SAT AND STRIP
OPTIONS CONTROLLED
BY SAT OPTION IN t.40DE
REGISTER

OPTIONS GROUNDED

10

• • • •
• • • •
• • • •

OPTIONS ALWAYS SET HIGH

TL/F/11122-13

Factory Default

=

Options Controlled by SAT Option in Board Mode Register

II
3-13

m

III

!

CO

a.
C

3.0 MAC Card (Continued)
J5: Master Clock Select
J5 programs whether or not this board provides the master
clock for the node. Typically in a DAS or SAS configuration,
only a Single MAC is used. The MAC card will provide the
clock for the entire system. If two MACs are present in the
node, only one of the MAC Boards should provide a clock.
This jumper should only be programmed when configuring Dual MAC systems.
J5: Master Clock Select

J2: Latch Clock Select
J2 is used to select which phase of the LBC to transfer data
between the Link and MAC Cards. This is used to optimize
set up and hold time on data transfers between the BMAC
and PLAYER devices when using a bus. This jumper '
should always be left at the default setting (LBC5).
J2: Latch Clock Select

• •
• •
• •

It'

LBC1
LBC2
3 LBC3'

• •

'2 ,',.",

4 LBC4

:¥:, J:

,f4 ....... "" "'""Y ""'" =

5 LBCS (FACTORY SETTING)
TL/F/11122-14

J3: CDD Device Feedback Select
J3 is used to select which phase of the LBC that the CDD
device will use in its feedback loop This jumper should be
left at the default setting (LBC1).
J3: CDD Device Feedback Select

::, ::i:~::::
2
3
4

5

•
•
•
•

•
•
•
•

LBC1

-+ BOARD SUPPLIES MASTER CLOCK

1.-_ _ _ _

(FACTORY SETTING)
TL/F/11122-17

INSTALLING THE BOARD WITH A LINK CARD
The MAC Card should be Inserted into the PC-AT or XT slot
along with the Link Card. Make sure that the board is inserted into the connectors accurately. The next step Is to connect the cabling between the MAC Card and the Link Card.
Two configurations are pOSSible, Single Attach Station
(SAS) and a Dual Attach Station (DAS).

(FACTORY SETTING)

LBC2
LBC3
LBC4

SAS Configuration
To implement a SAS Configuration a MAC Card and a Link
Card are inserted into two slots on the AT. Two cables are
required. First connect the 20-Pln Clock Cable Into the 20
Pin header on the top of both the Link Card and MAC Card.
Then connect the 50-Pin Cable between the two "A" port
connectors on the Cards. This is the connector farthest
from the back of the AT chassis (see Figure 5). Make sure
the cables are properly engaged with the pins by pressing
down on the top of the cable with your thumbs. Once the
cables have been attached inspect the cards to make sure
that they are straight in the connectors. Pressing in the cables has a tendancy to skew the cards in the slots.

LBCS
TL/F/11122-15

J4: Reference Select
J4 is used to select either the clock on the clock bus or the
local crystal oscillator as a reference. In order to provide
less skew between the Link and the MAC Cards, the CDD
device is locked to the Clock Bus signal. This jumper
should be left at he default setting.
J4 Reference Select

:1
3 •

I'"

:~

'~

1.-_ _ _ _•

""""' ""'"'" (LOO< " .....
(FACTORY SElT1NG)

DAS Configuration
To implement a DAS Configuration an additional Link Card
is required. (Two Link Cards + 1 MAC Card implements a
DAS). Insert a MAC Card and two Link Cards adjacent to
each other as shown in Figure 1. Connect the Cable between the Link Cards as shown, then connect the Clock Bus
Cable and the final Data Cable between the Link and MAC
Cards as shown. Note that the clock cable must attach to all
three boards. Make sure the cables are properly engaged
with the pins on the cards. Also confirm that the cards are
straight in the card cage after connecting the cables.

'"'J

INTERNAL REFERENCE (LOCK TO LOCAL XTAL)
TLlF/11122-16

3-14

~National

~ Semiconductor

OP83200SMT XLNT Manager™
FOOl Station Management
(SMT) Software Support Package
General Description
The XLNT Manager™ Software Package completely implements all required and most optional FOOl SMT Protocol
functions. It comes complete with well documented source
code written in the C programming language and an easy to
use Integration Guide. The source code is modular so that it
can be partitioned over multiple processors and can be
used in all FOOl applications including concentrators, and
dual and single attach stations. The porting guide includes
step by step instructions how to port the software to your
hardware platform. XLNT Manager FOOl SMT Software is a
product of XLNT Design Inc., and is made available to National Semiconductor FOOl customers through a sublicensing agreement. Technical support is provided by National
Semiconductor's fully trained FOOl Applications team.
XLNT Manager FOOl SMT Software combined with National
Semiconductor's FOOl chip set provides a complete FOOl
solution.
The software can easily be integrated into an operating environment using minimal hardware and system support from
the operating environment. The design of the software also
allows for rapid updating to implement changes to the SMT
Standard. Custom Management services can interface with
the SMT software through a standard, well defined, soft-

ware interface. An integration sequence example is included.

Features
• Implements all required and most optional ANSI X3T9.5
Station Management Protocol functions
• Complete portability of the code to most hardware platforms
• Oirect interface with the FOOl Chip Set for compact
and efficient implementation
• Flexible architecture to allow code partitioning for single
and multiple processors
• Standard interface between SMT software and custom
management applications
• Well documented source code (C Language)
• Supports single and dual attach stations and concentrators
• Operating System Independent
• Includes easy-to-use porting guide
• Free updates through 1991

Managemenl
Service.
Process

(MSP)

I
I
I
I

XLNT lIanager

~-------------.,

TLlF111121-1

FIGURE 1. Station Management (SMT) Software Block Diagram

3-15

2.0 Functional Description

Table of Contents

The XLNT Manager Software Package completely imple·
ments all required and most optional FOOl SMT Protocol
Functions. The software package consists of three main
functional blocks as shown in Figure 1. The three main functional blocks are 1) Management Services Process (MSP),
2) the Frame Services Process (FSP) and 3) the Connection
Services Processes (CSP).
.

1.0 OVERVIEW
2.0 FUNCTIONAL DESCRIPTION
3.0 INTEGRATION PROCEDURE
4.0 SUBLICENSE AGREEMENT AND MAINTENANCE

2.1 MANAGEMENT SERVICES PROCESS

5.0 TECHNICAL SUPPORT

The Management Services Process (MSP) processes information in the Management Information Sase (MIS). The
MIS is an information database which is defined by the FOOl
SMT Standard. It includes Information about the status and
performance of a station. The information is collected from
the hardware and other processes and stored in a central
database. The Management Information Sase (MIS) can be
accessed by a Management Application Process like the
Simple Network Management Protocol (SNMP) or by a remote station over the network. The Management Services
Process maintains the MIS and provides a uniform interface
to the Management Application Process, the Frame Services Process (FSP) and the Connection Services Process
(CSP).

1.0 Overview
One of the key areas in the FOOl standardization process
has been Station Management (SMT). The SMT document
provides the guidelines and protocols which can be used to
manage an FOOl network.
To ensure inter.operability in a multi-vendor environment,
some of the protocols described in the SMT document are
mandatory. However, to facilitate the diverse network environments envisioned for FOOl, many of the protocols described are optional. Implementation of the optional protocols' will depend upon the application need.
The basic SMT functions required are:
-

Fault management for high network availability
Reliable error detection and.recovery
Access to networked resources
Fast and reliable connection management procedure

-

Management for multi·vendor networks
Access to individual station information

-

Flexible network configuration

2.2 FRAME SERVICES PROCESS
The Frame Services Process (FSP) implements the framed
based services defined by the FOOl SMT Protocol. The
FOOl SMT Protocol defines several different frame types
which are used to convey status and control information
between stations on the network. For example, Neighbor
Information Frames (NIFs) convey information about the
station to its neighbor. This information can be used in the

Frame Service. Proce•• (FSP)

r--

r--------~~--------~I
Ring Manarment
(RMT

2

g

I.

"'"c
'""c

VI

tj
E
~
c

."

'"

E

J.
:$

~
I
I

Optional Optical Bypass
Switch Control

Configuration
SwRch

Physical
Layer
Protocol
(PHy)

Physical
Connection
Management
(PCM)

:!

Media
Access

Control
(MAC)

I
I
I
I

T

..

;;

.!i

L...-

I
I
I
I
I

I

Configuration
Management
(CFM)

'ii:'
VI

...I

.,.

..

+
,.t...l
1

>0

SAC

1

1-3

>1

>0

DAC

2

2-3

>1

>0

• testing of slave before insertion into ring
• determining the topology of a concentrator tree before
insertion into the Primary or Secondary ring
• graceful insertion of slave stations or concentrator trees.
There are still several problems associated with each of
these uses. There is no interoperable method for setting
parameters in a slave station and no protocol defined for
testing a slave before inserting it into a ring. Similarly it is not
clear that a roving MAC could find out more about a slave
station than a station self test could.

Naming Conventions
The concentrators are named according to the greatest
number of attachments they can handle (Null, Single or
Dual Attachment Concentrator NAC, SAC, DAC respectively). It is debatable whether this is the best way to name
concentrators since the other parameters are more likely to
vary.

These same problems could be solved in the context of
SMT without resort to a non-standard local path. A slave
could do a self test before requesting insertion into the ring
by causing remote loopback at the concentrator. The station could come into the ring with default parameters that
could also be changed during normal operation. And to
solve the ring mapping problems, an efficient protocol using
well known SMT Group Addresses could be used. There is
still a fair amount of work to be done in the area of inserting
slave stations into a ring. Use of the local path does not
solve these problems and the extra cost and complexity of
adding an additional path is questionable in terms of the
minimal payoff.

Attach Count
This refers to the number of attachments that are available
for use to either the trunk ring or to the concentrator tree. A
concentrator with an attach count of 2 could default to a
concentrator with an attach count of 0 or 1 if those attachments are not connected to anything else.
Paths
This refers to the number of token paths possible in a concentrator. These paths may then be used as part of the

4-13

III

ment services between stations that do not implement the
particular management protocol but do implement SMT and
the actual management application.

MACs
In order for a Concentrator to provide management services
and act as a manageable entity in a network, it should contain at least one MAC. This gives the concentrator the ability
to participate in the SMT frame based protocols and help
isolate, announce and recover from all types of problems.
By having MACs in concentrators, better logical and physical ring maps can be built.
To simplify the relationship between MACs and Paths, it is
easiest to have one MAC per Path. Otherwise it is necessary to multiplex a MAC between the paths. It is difficult to
manage inserted stations on a path that has no MAC.
The data throughput requirements for a MAC implementation are rather minimal, thus low cost management MACs
can easily be added. The cost associated with MACs has
been one of the main points of resistance to standardizing
the presence of at least one MAC in a concentrator. The
incremental cost of adding a MAC compared with the benefits of the added manageability makes it worthwhile, especially in configurations where it amounts to only two extra
chips. (In these configurations all of the memory and processor support is already present.)

2.4 Diagnostic Capabilities
Since a concentrator is one of the most complex nodes in
the network, it should contain extensive diagnostic capabilities. Essential to this is the ability to perform sophisticated
Path Testing and Resource testing of all resources within
the concentrator. The National Semiconductor DP83200
FDDI chipset has numerous diagnostic capabilities built in to
aid in isolating and resolving problems.
2.5 Bridging/Routing Capabilities
The concentrator is also a natural location to add in a MAC
level bridging or routing function between similar or different
media, networks, speeds, and protocols. Because of the
concentrator position within an installation it may offer a natural point to segment the local traffic contained exclusively
in the tree versus traffic that must go outside of the tree.
Such a concentrator would become a multi purpose network
attachment that could be a repeater/bridge/router and
manager where each function is added in as needed on a
common backplane. You could think of it as a ring in a box.

Master Ports
A concentrator will have several Master Ports, each of
which can connect to a Slave or Peer Port. The number of
ports is very implementation specific, and ranges from small
departmental concentrators with 4 M Ports to large multiboard concentrators with up to over 250 ports.

3.0 USING THE NATIONAL DP83200 FOOl CHIPSET
The National Semiconductor DP83200 FDDI chip set was
partitioned for use in all of the Standard FDDI configurations
including Single and Dual Attach Stations with one or two
MACs and in numerous Concentrator configurations.
The DP83251/55 Physical Layer Controller (PLAYER device) implements the Physical Layer (PHY) of FDDI and provides all of the support required by a processor running
SMT. In addition to providing all of the functions required by
an FDDI PHY, the PLAYER device includes support for the
Link Error Monitor Function, the Noise Counter (TN E), Line
State Detection and Generation, and Configuration Management. Two full duplex parallel ports are supported along
with a built in Configuration Switch in order to provide the
flexibility to support all of the station types (SAS, SM-DAS,
DM-DAS) and configurations (THRU, WRAP, ISOLATE).
Concentrator configurations with numerous M Ports and 2
internal paths can be created without any external logic.
The low power dissipation and minimal real estate required
by the PLAYER device makes these chips ideal for concentrator applications.
The DP83231 Clock Recovery Device (CRDTM device) provides a very high performance analog Phased Locked Loop
with very high noise immunity. It can lock to the worst legal
patterns in under 85
and provides a very high dynamic
lock range.
The DP83261 Basic MAC Layer Controller (BMAC device)
implements the Media Access Control Layer (MAC) of FDDI
and provides the support required by a processor running
SMT. In addition to providing all of the functions required by
an FDDI MAC, the BMAC device includes support for RMT,
all of the required and optional frame counters, measurements of the ring/path latency and many tunable parameters.
The DP83265 BMAC System Interface (BSITM device) is
also available for providing a straightforward system memory interface. Tile BSI device also provides several features
that are useful for SMT such as independent channels for
Management Data (SMT /MAC).

2.2 Expandability/Configurability
Another way in which concentrators can be differentiated is
by their packaging. In many instances a low cost fixed configuration makes sense. In other cases an expandable and
configurable concentrator might be attractive.
An attractive fixed configuration might consist of 8 ports that
could be used as an 8 port NAC, a 7 port SAC or a 6 port
DAC.
An attractive flexible configuration might consist of Slave or
Peer Attach boards and Master Port boards. On each Master Port Board there might be 4 or 8 Master Ports.
An example of both a fixed and flexible concentrator are
outlined as examples in Section 4.
Another dimension in which concentrators can be configurable is in the PMD that is supported. FDDI already supports
both a multi-mode and a single mode fiber optic PMD and it
is very likely that additional lower cost PMDs such as Shielded Twisted Pair and shorter distance fiber optic connections
will be supported. By isolating the PMD to a separate board
the PMD could be a configurable option.

"'S

The Concentrator could also serve as a repeater between
different media domains by using different PMDs in different
ports.
2.3 Management Capabilities
Concentrators can also be differentiated by the management capabilities that they provide. The SMT Standard provides many implementation options does not specify how
the services that it provides will be used. The Concentrator
is a convenient location to run Network Management Applications slich as a ring monitor, ring mapper, traffic analyzer,
traffic generator, etc. It also is a logical location to run higher level management agents such as SNMP and/or CMIP.
Management agents serve as proxy agents for manage-

4-14

The DPB3241 Clock Distribution Device (CDDTM device)
generates all of the clocks required by the PLAYER, BMAC
and BSI devices. The CDD device accepts either an external reference or a local crystal. In a concentrator the CDD
device is particularly useful in that all of the clocks required
by the PLAYER device can be generated locally and only
slower speed 12.5 MHz clocks need be distributed. The
CDD device also provides 10 different phased clock outputs.
The chipset also provides numerous diagnostic features.
These include full duplex data paths to allow diagnostic
transmission to self, multiple levels of loopback to isolate
individual chip and interconnect errors and the ability to inject errors and make sure that proper recovery takes place.
In addition, while operational, several levels of self checking
are also employed. These include through parity support,
full duplex data paths so that every frame transmitted can
also be received and the FCS can be checked (the frames
could also be copied), and a full implementation of the FDDI
protocol which is self checking in itself.
The chipset also includes several programmable features
that allow compatibility with the ongoing enhancements to
the ANSI specification.

A and B Ports (A to Sand B to S connections). When there
is a tree to connect into, the concentrator can be configured
to allow M to A and/or M to B connections. In this way, this
concentrator could be used as a Null Attach Concentrator
with 10 leaf connections, a Single Attach Concentrator with
9 leaf connections or a Dual Attach Concentrator with 8 leaf
connections.
With the two path design shown and correct programming
of the configuration switches, the second path could be
used as a local path while bypassing the ring's secondary
path within the concentrator (see Figure 4-4). Note the subtle differences between Figure 4-2 and Figure 4-4. Only the
connection surrounding the Peer Ports is changed. Thus effectively, three paths are present within the concentrator,
although not all of them can be active simultaneously. With
additional external multiplexing, a dedicated third path could
be added to the deSign. The third local path would then
always be available for internal testing for use with a roving
MAC. The benefits of a dedicated third path versus the additional cost are questionable.
The processor controls the BSI, BMAC and PLAYER devices through the common control interface. The control bus
uses a simple asynchronous handshake. The processor can
accomplish all of software oriented portions of SMT (CMT,
RMT, monitoring functions) using this common interface.
The SMT frames are typically generated and processed in a
shared memory.

For more details see the appropriate device datasheets.
4.0 EXAMPLE DESIGNS
The following examples illustrate the simplicity of building
concentrators with the National Semiconductor DPB3200
FDDI chipset. Two example designs are shown representing
two ends of the spectrum. First a Single Board, Single Processor Concentrator is shown, followed by a Multi-Board,
Multi-Processor deSign.

»

z
......
"'......"'
I

Moderate interrupt response time is required to assure compliance with the default requirements (3 ms) of the Physical
Connection Management (T_REACT, PC_REACT, etc.).
Depending on the interrupt latency of the processor, as additional M Ports are added, the processor will eventually
reach its limit in terms of the number of ports that can be
handled Simultaneously. In concentrators with many M
Ports, in order to guarantee the required response times, it
may become necessary to partition tasks among multiple
processors or switch to a processor with a better interrupt
latency (provided that it is not saturated).

4.1 A Single Board Single Processor Concentrator
A simple FDDI concentrator contains a Single processor and
is designed on a single card. The clear advantage of this
type is reduced cost, though forfeiting flexibility and expandability.
Figure 4-1 shows a simple single processor dual attach dual
path deSign. The diagram also suggests a physical layout of
the devices. Even the pinout of the devices in the chipset
were optimized for these applications.

A concentrator requires a moderately high performance
processor with support peripherals such as timers and interrupt control. In many designs it is preferable to use a processor that includes these support peripherals. National
Semiconductor offers a full range of processors that are
appropriate for this application from the HPC family of High
Performance Controllers to the 32000 family of processors.

The concentrator shown has an A Port, B Port, 4 or more M
Ports and 2 MACs. It also has two complete physical paths,
one of which can be used as the Primary Path, and the
other as a Secondary Path or Local Path. The M Ports connect into the Primary or Secondary Path through the PLAYER device's configuration switch as shown in Figure 4-2.

4.2 A Multi-Board Multi-Processor Concentrator
A multi-board concentrator will be used where flexibility and
expand ability is desired over lower cost. For an organization
where adding functionality with time is attractive, the multiboard design is appropriate.

Extensive Path testing can be accomplished as two complete rings can be made operational as shown in Figure 4-3.
For the ring to be operational, all data paths have to be
working properly. The MAC on each ring will go through the
Claim Process and if it receives its own Claim frame successfully, a token will be issued which will continue to circulate. That MAC could then send frames to itself for even
more robust path testing.
The port types are distinguishable by the fiber optiC connector receptacle keying. During the connection establishment
procedures of SMT (Physical Connection ManagementPCM), the connected port types are checked for compatibility. Typically SMT will only allow A to B, B to A and M to S
connections, but SMT can be configured to override this
protection mechanism.

The design is partitioned into three basic cards and a backplane is defined (see Figure 4-5). The three cards include: a
Master Port Card, a Slave Port Card, and a Peer Port Card.
A controller is present on each card to allow very large configurations beyond the constraints of a single processor.
This also decreases the performance requirements of the
main processor by reducing the response time requirements. Having a processor on each card coupled with a
high enough performance serial bus between all cards also
reduces the size and complexity of the backplane to less
than 50 Signal pins all at or below 12.5 MHz.

When there is no trunk ring or concentrator tree to connect
into, SMT can be configured to allow slaves to attach to the

4-15

•

AN-741

TO RING

TO RING

!en

TO SLAVE

TO SLAVE

TO SLAVE

TO SLAVE
TL/F/11120-1

FIGURE 4-1. Single Board Concentrator

PRUN
PIUND
A..JND

---+

PH-.lND

I

PH--'lEO

--.

...J

r---

I

J,.

I

SEC_OUT

SEC-.lN

PILREO

PM-.lND

B--'lEO

r---

PHYI

.LREO

~

-

A..JND

!

I PRLOUT

IL

~

UEO

B--'lEO

~

.LIND

B--'lEO

-

PHY2

B-.lND

MAC2

PM--'lEO

~

PH--'lEO

I

PH-.lND

+--

B-.lND

MACI

!-oJ

- -

.LIND

~

.LREO

B--'lEO

-,

PM-.lND

-

PHY3

r

I

B-.lND

PM--'lEO

TO SLAVE ACTIVE
ON PRIMARY

+--

--.

UNO

r--.LREO

-,

PM-.lND

r---

PHY4

r

I

B_IND

PM--'lEO

TO SLAVE ACTIVE
ON PRIMARY

----

.LREO

B--'lEO

~
/
.....

PM-.lND

I

-

B_IND

PM--'lEO

~

r----+

.LIND

r--.LREQ
PM-.lND

B--'lEO

r---

PHY6

.--------.

I

B_IND

+-

-

PILREO

TO SLAVE ACTIVE
ON SECONDARY
TUF/11120-2

FIGURE 4-2. Configuration Switch Insertion

~tl·NV

II

AN-741

PRLlN.~
PM_IND

J

SEC_OUT

SECIN

PM_REQ

PM_IND

I

L--.....I

r-+

PH_IND

I

PH_REQ

--.

-

~IND

LREQ
----'-

PHYl
~REQ

~

B_IND

r---+

B_REQ

+--

1I

PRLOUT

I

L--.....I

B_REQ

~IND

I---

MAC2

PILREQ

+--

PH_REQ

I---

PHY2

I

PH_IND

~

B_IND

~REQ

MACl

!CD
'---

--+

B_REQ

~IND

r-~REQ

PM_IND

r---

PHY3

,..------,

I
ISOLATE

LIND

PfoLREQ

+-----+

~IND

-

-

PHY4
~REQ

PM_IND

,..------,

I
ISOLATE

B--'ND

PM_REQ

r-----+

B_REQ

~IND

r-~REQ

PM_IND

r--

PHY5

,..------,

I
ISOLATE

B_IND

PM_REQ

I+- - UNO

r-----+

~REQ

PM_IND

B_REQ

-

PHY6

,..------,

I

B_IND

+-

-

PM_REQ

ISOLATE
TL/F/11120-3

FIGURE 4-3. Internal Path Testing

PRUN
P~UND

A.JND

i-J

r---

r-+

PH_IND

I

PH_REQ

f----+

I

J,

SEC_OUT

IL

P~LREO

B_REQ

r---

PHYl

UEO

+--

B_IND

----

B_REQ

+--

-

J_ .1
IL
..J

SEC_IN

PRLOUT

P~UND

PM_REO

A.JND

B.JlEQ

-

PHY2

/LREO

MAC2

~

PH_REO

I

PH.JND

~

B_IND

MACl

!

CD

""-

----

B.JlEQ

/LIND

-

/LREQ

..,

PtLtND

PHY3

I

r

-

B.JND

PM.JlEQ

/LIND
~ r---

f---+

/LREQ

r---

PHY4

h

PM.JND

I

r

B.JND

PM.JlEQ

----

/LIND
/LREQ

B.JlEQ

~
/

PM.JND

.......

1

~ A.JND

B.JlEQ

I--

B.JND

PM_REQ

~ UEQ

PHY6

I--

..---.

B.JND

PM.JND I

I

~

r---

PM.JlEQ

TUF/11120-4

FIGURE 4-4. Use of Local Path

~tl-N"

II

AN·741

PRIMARY PATH
SECONDARY OR
LOCAL PATH

,...---,(1;11
-I>

'"
o

INCLUDES:
1,2 OR 3
MACS AND
MAIN SMT
PROCESSOR

INCLUDES:
2,4 OR MORE
MASTER PORTS
AND LOCAL
SMT
PROCESSOR

•••••

INCLUDES:
2,4 OR MORE
MASTER PORTS
AND LOCAL
SMT
PROCESSOR

TLlF/11120-5

FIGURE 4-5. Concentrator Backplane

memory used for frame transactions (PDUs). The SMT processor handles all lower level SMT tasks (PCM, CFM, etc.).
This main SMT processor also uses a serial controller, to
interface to the other processors in the concentrator across
the serial bus.
National Semiconductor offers a variety of processors and
controllers for this task. The NS32GX320 is a 15 MIP CISC
machine with on-chip cache, timers, interrupt control and
DMA support. The NS32CG160 is a lower performance and
lower cost alternative and is suitable for the SMT function
as is the HPC. The HPC also includes an on-chip 1 MHz
serial interface and an on-chip UART that could be used for
a local RS-232 connection. This connection can be used for
diagnostic purposes, or for connection to a network analyzer console.

Master Port Card
The Master Port card provides several (2, 4, 8 +) M Ports.
The Card shown in Figure 4-6 shows 4 M Ports. These M
Ports are typically connected to the S Port of slave stations.
The slave station could be a single attach workstation or
single attach concentrator at the next lower (or same) level
of the concentrator tree. The M Ports could also be used to
connect Dual Attach Stations and Dual Attach Concentrators where Dual Homing is permitted. In these configurations, to maximize redundancy, the two attachments would
be connected onto two different concentrators.
The M Port card can be designed with multiple PLAYER
devices (PHY layers). The number of ports per card is restricted by the physical limitations of the card such as the
space required by the connectors, optical components and
PLAYER and CRD devices. The processor or microcontroller must service physical SMT tasks within the maximum
times specified in the Standard (T_React, PC react, etc.).
The increase in service latency that accumulates as additional PLAYER devices are connected to the control bus
might also limit the number of Ports that can be supported
on a card for a given processor configuration. SMT tasks
are serviced locally by the processor and reported back to
the main SMT processor located on the slave (or peer) card.

»
z

.

.....
0l:Io

...

Backplane Design
The cards plug into a common backplane as shown in Figure 4-4. The backplane provides the interconnection between the various cards and provides a common clock reference and the serial bus. Less than 50 signal pins are necessary, all at or below 12.5 MHz so no sophisticated backplane design is required.
At each slot, two complete token paths are provided. The
10-bit internal National code is sent over the backplane. For
each path, 10 input and 10 output signals are used. For
each slot, 40 signals are present. The output of one slot is
connected to the input of the next slot in order to create the
token paths. The two physical paths are used by SMT as in
the single board design.
A backplane design can use speCial shorting connectors on
a terminator card which would keep the daisy chain paths
connected when no board is plugged into a slot.
In a single processor design, the backplane must also provide a control path for inter-board communications. The
control bus would have to be extended across the backplane in order to provide access to all of the devices. Depending on the capabilities of the main processor, the limitations of its response time, the desired extendability of the
concentrator, this mayor may not be warranted.
The requirements placed on the serial bus/ring are rather
minimal if partitioning of the SMT functions is done well.
Typically, all of PCM would be done locally on each M Port
Card and the simple portions of CMT as well. One very simple protocol to run on a serial bus uses a two or three wire
interface where a main processor polls the other processors
in the system, one at a time. Small (size and cost) RS-485
transceivers such as National's DS75176B or DS3695 can
be used for a simple interface to the backplane.

The National Semiconductor High Performance Microcontroller (HPC) is well suited for this local task. It provides low
interrupt response time, fast 25 MHz operation, embedded
timers for CMT and serial communications capabilities for
implementing a serial bus.
Peer and Slave Port Cards
The Peer and Slave Port Cards provides ports for connection into the larger Ring. With the Peer Port Card, A and B
Ports are provided for connection into either the trunk ring
or a concentrator tree. With the Slave Port Card, an S Port is
provided for connection into a concentrator tree.
Figure 4-7 shows a Peer Port Card design which includes
the A and B Ports, two MACs and the main SMT processor.
The Slave Port Card shown in Figure 4-8 includes one S
Port, one MAC and the main SMT processor. An advantage
of placing the main SMT processor on the same card as the
MAC implementations is to avoid providing support for a full
databus on the backplane or on another potentially expensive special connector. With the DP83200 chipset including
the DP83265 BSI, System Interface device, space efficient
and cost-effective memory interfaces are possible.
The Clock Distribution Device provides all of the clocks required for the DP83200 chipset. Since there is typically only
one Slave or Peer Port in a system, this card drives the
12.5 MHz reference clock onto the backplane. Each card
has a local CDD device which uses the reference to generate the appropriate clocks for the card. Clock distribution in
very large concentrators is discussed separately.
The SMT processor interfaces directly to the local PLAYER,
BMAC and BSI devices across the 8-bit Control Bus. This
bus is used for access to registers, parameters and counters (configuration switch, line state detector, statistic counters, etc.). The SMT processor also interfaces to the local

Concentrator Extensions
The backplane defined could be viewed as links between
stations. The SMT standard only makes assumptions about
the MAC at the exit ports and makes provisions for additional MACs within concentrators. This allows additional cards
to be developed to provide a bridging function either to other rings, or even between paths.

II
4-21

AN-741

B;;J.i.~SE{R~Tg0f.·;··;::::;:·:·::;:·:;·ljB
~~}}:

1I

SERIAL BUS
TRANSCEIVERS

SERIAL BUS

12.5 MHz REF

{

}}{

SERIAL
{
COMMUNICATIONS \

1ttL. . . .S.U.P:~R:

CD!..I
CLOCKS

INTERRUPT
CONTROL

... ...

fa
W

ROM

SUPPORT

A'~L,..~~"'}"'j"'\.,t"'i,..i.,..~~"'i,.,.tr
RAM

-"PROCESSOR

l
.,..

PRIMARY OUT

I

~

J

I

SECONDARYIN---------------------------4-t-----------------------I--------------------------------------------,

N
I\)

I
CONTROL INTERFACE

SECONDARY OUT
PRIMARY IN

+---i A...IND PLAYER
-----+\ A...REO
PM_IND

B_REO

B_IND
PM_REO

~

I

I

I

CONTROL INTERFACE

CONTROL INTERFACE

CONTROL INTERFACE

A...IND

PLAYER

A...REO
PM...JND

B_REO

B_IND
PM_REO

T

FIBER OPTIC TRANSCEIVER

I

~

+

TO SLAVE

1-----l- ---~

A...IND

PLAYER

A...REO
PM_IND

B_REO

B_IND
PM...JlEO

A...IND

PLAYER

A...REO
PM_IND

B_REO

B_IND
PM_REO

I

~

i

T

~

FIBER OPTIC TRANSCEIVER

FIBER OPTIC TRANSCEIVER

FIBER OPTIC TRANSCEIVER

M_PORT

M_PORT

M_PORT

TO SLAVE

TO SLAVE

TO SLAVE

FIGURE 4·6. Master Port Card

~

i

+
TLlF/11120-6

RAM

DATA

~

CONTROL
INTERFACE

1

ADDR

TO RING

TO RING

T

T

!

B_PORT

FIBER OPTIC TRANSCEIVER

FIBER OPTIC TRANSCEIVER

~

RAM

ADDR

1

DATA

I

I

BSI

t

.!

MA-IND

P~UlEO

lolA-REO

BMAC

PH-'lEO

PH-.lND
CONTROL INTERFACE

B_REO

~

I

CRD

.!
PM-.lNO

PLAYER

PM_REO

A-.lND

B-'lEO

BSI

CRD

CONTROL
INTERFACE

.!

.!

f

PM_INO

lolA-REO

MA-INO

PLAYER

UNO

B-.lND
UEO
CONTROL INTERFACE

B-.lND
UEO
CONTROL INTERFACE

I

I

I
t

!

AJ'ORT

-

.....

PH-'lEO

-

BMAC

PH-.lND
CONTROL INTERFACE

I

PRIMARY
TO

SECONDARY OU

BACKPLANE

SECONDARY

C.:I

PRIMARY OU

I CONTROL INTERFACE I
~ CLOCKS

12.5 MHz REI

SERIAL BU

----1

COO

I

J SERIAL BUS 1
"I TRANSCEIVERS 1

·tr·~·::::::·:::·I~r:·:·'·:··:·:··:·:·":···':··:·X':'':':"'X':":':"":":':"~8 ff·:···':··.':··:·:·'·:··:··'·.':··:··'·~
: } CONTROL

Et.

pPROCESSOR

~ ~

RAM

~~

l~i;;}:~!~I~t:~~;::j

TUF/1112D-7

FIGURE 4-7. Peer Port Card

~"l·N\f

II

AN·741

TO RING

DATA

I-

CONTROL
INTERFACE

BYORT

1

FIBER OPTIC TRANSCEIVER

ADD

BS)

r CRD

f

l

M"-IND

MUEQ

PMJlEQ

PHJlEQ

BJ!EQ PLAYER "-IND
B-.lND
"-REQ
CONTROL INTERFACE

BMAC

J

PH_INO
CONTROL INTERFACE

I
~

~

T

RAM

PM-'ND

f---

~

J

PRIMARY
TO

{ SECONDARY OU
BACKPLANE
SECONDARY
PRIMARY OU

L

CONTROL INTERFACE

12.5 MHz R

SERIAL BU

----1

c
CDD

CLOCKS

I

J SERIAL BUS I
~I TRANSCEIVERS

I

J

~~I;~;;;::I ~;;:~
.}[:~,,~

SUPPORT

••~ TIMER/COUNTER ~. ~

ROM

.:~.

~1:a~i.~.~g~.~:~·~~JjjMiLg,.:.,:::::'::.:::.:.:.:.:.:.Ifi.:.:.:.:., :.:,.:. : .:.:.,.:,j
FIGURE 4-8. Port Board

TL/F/11120-8

Another possibility for add in cards for a concentrator are
special network monitoring cards and network testing cards.

Before moving a MAC from one path to the other, it is necessary to remove all frames transmitted by this MAC in order not to create ownerless frames on the path that the
MAC is leaving.

Another extension is the ability to support live insertion of
boards to avoid interruptions. This might even involve intelligent backplanes that could involve sophisticated multiplexing functions.

With the BMAC device, one way to accomplish this is to
enable the Inhibit Token Capture option (Option.ITC) for at
least one ring latency (after this station issues the token, if it
is being held) before changing paths. Before leaving, it is
also helpful to capture the token in order to avoid corrupting
any frames. When placing the MAC on the new ring, it is
necessary to insert while claiming. It is not possible to guarantee graceful entry if a token is not being held on that path.
When the situation exists for this station to scrub the ring of
ownerless frames, several options are provided. The BMAC
device provides a robust stripping mechanism that can be
used without any destructive side effects, namely the STRIP
option where stripping continues until a My_Void frame
comes back around the ring, thus stripping all of the ownerless frames. This occurs automatically after this station wins
Claim before the first token is issued. Similarly, the Inhibit
Repeat option or the ability to block the MAC input from the
PLAYER device for more than one ring latency also provide
this function.

A standard for a concentrator backplane is a likely possibility at some pOint so that many different cards could be developed. This would allow customers to build concentrators
with boards from many different vendors just as standard
buses are used today to create customized computing environments.
This does cause one problem, when does a concentrator
stop being a concentrator?
5.0 SMT NOTES
Several topics relating to implementations of Station Management for a Concentrator are worthy of discussion, many
of these are covered below. Some of these topics relate to
SMT implementations for stations as well.
5.1 Processor Performance Requirements
The most stringent requirement on an implementation of
PCM using the PLAYER device is the Active to Break transition. The Standard requires that this transition takes place
within 3 ms. This implies that within 3 ms after an interrupt is
generated by the PLAYER device, a register is written to
send out Quiet symbols and change the programming of the
configuration switch. By using a low end processor to control several M Ports, the requirements on the main processor are reduced significantly. When bringing links up and
going through the PCM signalling, the timing constraints are
much less severe since there are no requirements for bringing up multiple links simultaneously. It is acceptable to distribute processing with several PLAYER devices controlled
by a single processor.

5.4 Graceful Insertion of Slaves
The graceful insertion (also known as smooth or bumpless
insertion) of slave stations or slave concentrators into a ring
allows stations to be placed Into a ring without disrupting
other stations in the ring. Unlike a ring consisting only of
Dual Attach Stations where the ring must go through at least
the Claim Process on each insertion/deinsertion and possibly cause frames to be corrupted, with concentrators it is
possible to provide the capability to insert and deinsert stations gracefully without any data corruption.
Two methods of varying complexities are shown for graceful
insertion.
With the first method to gracefully insert a slave the following must be accomplished:

5.2 Path Test
A complete path test in a concentrator is invaluable for isolating problems. Especially in large configurations, the ability
to isolate errors, such as marginal connectors or connections, faulty components, etc., is extremely important.
The two complete token paths suggested in both example
designs allows operational rings to be created within concentrators to check connectivity and components. The
DP83200 chipset provides numerous features that aid in
isolating problems down to the chip level. Modes such as 4
loopback paths, error insertion and statistic counters are
just a few of the features included that give true networkl
system testing capability without complex external circuitry
or equipment.

1) make the slave ready to bring the ring operational on the
next received token
2) capture a token on the path on which the slave will be
inserted
3) while holding the token, modify configuration switch of
the M Port to insert the slave
4) hold the token for at least actual ring latency of the new

ring (the inserted slave concentrator might be bigger than
the rest of the ring)
5) issue the token
Step 2 above requires a MAC on the path on which the
slave will be inserted. The slave is inserted into the ring in
step 3 above. The token must be held for a ring latency in
order to guarantee that no frames are corrupted. This could
occur if a slave connected to this concentrator transmitted a
frame to an upstream slave connected to this concentrator.
To avoid a TRT expiration in a downstream station while
holding the token, a pool of synchronous bandwidth could
be allocated and shared by all concentrators on the ring.
This can be done using asynchronous transmission with
THT disabled (one of the service classes provided by the
BMAC device).

By having two complete paths, if a fault exists, the fault can
be isolated precisely by careful programming of the configuration switch (see Figure 4-3). Once it is known which configurations are physically possible, it then becomes necessary to decide which paths should be connected and when
this should be done. The current configuration must always
be valid and up to date (there are still conflicting views on
how this information should be kept in the MIB).
5.3 Moving MACs between Paths
In designs with fewer MACs than paths, it is necessary to
move the MAC between paths. In many cases it is easier to
just put a MAC on each path than to build all of the necessary software interlocks..

4-25

,- r----------------------------------------------------------------------------------------------,
-.:r
Depending on the assumptions you can rely on concerning
Concentrators have more stringent packaging demands
.....
than most end attachments due to environmental, modulari:Z a slave station after PCM, Step 1 mayor may not require a

Since all frames that are transmitted, must be stripped before the 7th symbol of the INFO field, the VOIO stripping still
must be used, because it would not be tolerable to strip
based on a bridge number later in the frame.
There are some subtle requirements placed on the transmission of frames in Source Routing Bridges. For example
in some frames, the Most Significant Bit of the SA remains
unchanged for some frames and is forced to zero in others.
The SAT and SAIGT BMAC device input signals can be
driven from the SAT signal on the BSI device. In addition,
the STRIP option also needs to be used to strip frames
forwarded by this station.

ing Information Field is denoted when the most significant
bit of the SA field is set to One. The Routing Information
Field contains a string of 16-bit bridge numbers that the
frame is to be routed to. These 16-bit bridge numbers are
considered aliases of a certain bridge.
Source Routing Bridges fall under the category of explicit
bridges used in the MAC-2 Oraft Standard. In explicit bridges, the addresses that the bridge recognizes are considered
its aliases, and the A Indicator is set for this class of address
matches. (For this reason, in these implementations it is
possible to connect the EA signals of the BMAC and BSI
devices together.)
5_1 Address Filter
The Address filter is much simpler in Source Routing bridges than in transparent bridges. The address filter is required
to parse the Routing Information Field, when present, and
look for this bridge's 16-bit 10 number. If the number is present in the Routing Information Field then the frame is copied
and the control indicators are set appropriately using the EA
and ECIP inputs to the BMAC and BSI devices. The frame is
then forwarded to the next destination in the list.
5.2 Discovery Process
In order for an end station to determine the route to another
end station, the discovery process is necessary. In one variation of the discovery process, a station transmits out several all route frames. Each bridge then adds its bridge number
into the Routing Information Field, until the addressed station has been reached. The addressed station then transmits back a frame according to the "best" route. This route
is then used for future transmission.
5_3 Forwarding
Once the bridge's, bridge number is detected in the Routing
Information Field, the frame can be forwarded to the next
bridge number using the appropriate port (in a multi-port
bridge).

5.4 End to End FCS Checking
Between FOOl and FOOl rings complete End to End FCS
checking is possible. It may also be possible to provide this
type of service between IEEE802.5 and FOOL In any event,
the FCST (FCS Transparency) input is used to control this
option.
6.0 SOURCE ROUTING BRIDGING IMPLICATIONS FOR
END STATIONS
There are a few requirements placed on End Stations that
participate in Source Routing protocols. The end station
maintains the responsibility for discovering the route to its
peers using the All route frame. Once the route has been
discovered, it must be used in all future correspondences as
part of the Routing Information Field.
An End station has no requirements for any ex1ernal address matching logic. End stations can use the ability to
transmit only the MSB of the SA (the Routing Indication
Indicator) from the data stream using SAIGT. When using
the BSI device, the BSI device SAT could be connected to
the BMAC device SAIGT; similarly, SAT could be grounded
and the BSI device STRIP could be connected to the BMAC
device STRIP Signal. The reason the rest of the SA can
come from the Ring Engine is to insure proper stripping
based only on the transmitted SA. This implies that in End
Stations there is no need to use Void stripping.

4-35

z
I

-...I

o
"""

co

....
N

National Semiconductor
Application Note 726

:Z Station Management

< Simplified

MyLe

INTRODUCTION
One of the key areas in the FOOl standardization process
has been the work on Station Management (SMT). The
SMT document provides the guidelines and protocols which
can be used to manage an FOOl network.
To ensure interoperability in a multi-vendor environment,
some of the protocols described in the SMT document are
mandatory. On the other hand, to facilitate the diverse network environments enviSioned for FOOl, many protocols described are optional. Thus the users need to determine the
SMT protocols to be implemented based on their application and configuration requirements.
This application note provides an introduction to FOOl Station Management with the assumption that the reader is familiar with the MAC, PHY, and PMO portions of the FOOl
protocol.
The following topics are included in this paper:
• Station Management Requirements
• Structure of FO,OI Station Management
• Basic SMT frame work to manage an FOOl network
• Optional management protocols based on configurations
and applications
• SMT features provided by the National's OP83200 FOOl
chip set

1.0 SMT Requirements
Before determining the SMT requirements for FOOl, let's
define the major types of users of the network. Based on
the requirements of the users, we can then determine the
functions required by SMT.

ue to operate. And finally, the error should be detected and
removed from the network in a deterministic fashion as
quickly as possible.
Thus, SMT needs to provide extensive and complete Fault
Oetection and Recovery procedures to satisfy the requirement of network's reliability.
• Access to All Authorized Networked Resources
SMT can be used to provide the mechanism for the End-Users to obtain the services available on the network. This
service is useful, especially in a multi-vendor environment,
to guarantee that all stations can receive the same types of
network services regardless of their particular implementations.
An example of the services provided by the FOOl network is
Synchronous Bandwidth Allocation. Using this service, stations can then obtain part of the bandwidth to transmit synchronous data.
• Plug-and-Play
Connection to a network should be made as simple as possible such that the End-Users can plug into the network
without the need for complicated instructions or the possibility of bringing down the network by mistake.
This requirement is especially important in a large network
such as FOOl where a large number of stations can potentially be connected, disconnected, or moved at any given
time.
To satisfy this reqUirement, SMT needs to provide a comprehensive connection management procedure to allow stations to be connected quickly and correctly to the network.

1.1 TYPES OF USERS

Network Administrators

Users can be divided into two main groups: End-Users and
Network Administrators.

The main requirements of the network by Network Administrators are:

The End-Users are mainly interested in the services which
the network provides; thus, SMT operations on the network
should appear transparent to the End-Users.
The second major type of user in an FOOl network is the
Network Administrators. While the End-Users would like to
know as little as possible about the network, the Network
Administrator's goal is to gather as much information about
the network and its attachments as possible; thus SMT
should be designed to allow the Network Administrators to
control the network in a manner that is unobtrusive to the
End-Users.
End-Users

• Ability to Gather Information
One of the key functions of Network Administrators is to
monitor the status of the network and the attached stations.
To achieve this goal, the Network Administrators must have
the capability of requesting and receiving information from
stations on the network.
From the information gathered, the Network Administrators
can then determine the status of the network and invoke
any recovery mechanisms if necessary.
To meet this reqUirement, SMT needs to provide a monitoring procedure where the Network Administrator can gather
information frequently and accurately.

The main requirements of the network by End-Users are:
• Standardized Management Services
• Network Services Reliability
One of the top requirements from the End-Users is the reliability of the network. The network should remain up and
running with the probability of an error occurring as infrequently as possible.
When an error does occur, it should be isolated while the
rest of the network that is free from the error should contin-

In an open network environment where the Network Administrators have to control equipment from a large number of
vendors, there is a need for standardized management
services to allow the Network Administrators to communicate with any station on the network regardless of its implementation.

4-36

l>
The standardized management services also allow the Network Administrators to interpret the information received
from the stations.

• Reliable error detection and recovery management

• Flexible Network Configuration

• Management for multi-vendor networks

Networks can be designed in many configurations depending on many factors such as applications used, building
structure, etc. A network that can be configured in many
different forms gives the Network Administrators the flexibility to design the network based on their own requirements
and constraints.

• Access to individual station information

• Access to networked resources
• Fast and reliable connection management procedure

• Flexible configuration

2.0 SMT Structure
SMT is the layer management service for FOOl networks
which covers the Physical (PHY) and Media Access Control
(MAC) Layers. SMT serves two main purposes in an FOOl
network:
1. To collect information to report to the Management
Agent Process which is responsible for the management
of the entire station (above the PHY and MAC Layers),
and

FOOl Station Management provides the Connection Management procedure which allows the network to be connected into many different configurations (e.g., dual ring of
trees, single tree, dual ring, etc.).
• Ability to Manage the Network Remotely

It is desirable for the Network Administrators to monitor activities on the network or trouble-shoot problems from a
central location. It is also desirable to down-load information
without physically being at the stations.

2. To manage stations on the network by starting and maintaining the PHY and MAC Layers.

To provide these types of services, SMT needs the capabilities to control the remote stations and order them to perform certain operations.

SMT is divided into three main groups: Connection Management, Ring Management, and SMT Frame Services. The
functions of these entities are described followed by a more
detailed discussion on each.

1.2 SMT FUNCTIONS

Figure 1 shows the overall SMT Architectural model.

Based on the types of users on an FOOl network and their
applications as described above, a list of the SMT requirements can be drawn up as follows:
• Fault management for high network availability

SMT

rrame
Services

Ring
t.tanagement
(RMT)

Management
Agont
Process
Connection
Management
(CMT)

notification

operatio~
I
I
I
I
I
I
I

StotT
FOOl STATION
TLlF/110BO-1

FIGURE 1. Station Management (SMT) Architectural Model

4-37

z
I

......

N

Q)

Configuration Control Management
The Configuration Control Management (CCM) controls the
interconnection of PHYs and MACs within a node to configure one of the following node types:
• Single Attach Station (SAS)
• Dual Attach Station (DAS)
• Single Attach Concentrator (SAC)
• Dual Attach Concentrator (DAC)
There is one CCM entity per Port.

2.1 Connection Management
Connection Management (CMT) is the management entity
in SMT that is responsible for the Ports (a Port is a PHY and
PMD pair) and their interconnections to their neighboring
Ports. It Is also responsible for the configuration of MACs
and PHYs within a station.
CMT's functions include the following:
• Establish and initialize physical connections
• Control station configuration
• Detect Physical Layer faults
The CMT entity is further divided into three sub·entities: Entity Coordination Management, Physical Connection Man·
agement, and Configuration Control Management.

2.2 Ring Management
Ring Management (RMn is the entity in SMT that is responsible for the MACs within a station.
RMT's functions include the following:
• Notify station of MAC availability
• Detect logical MAC Layer faults
The RMT entity receives status information from the MAC
and the Configuration Control Management (CCM) entity.
The information is then reported to the higher-level management entity.
There is one RMT entity for each MAC in a Station or Concentrator.
Figure 2 shows the internal structure of the CMT and RMT
entities.

Entity Coordination Management
The Entity Connection Management (ECM) indicates when
the media is available (i.e. when signals can be transmitted
and received). It is also used to coordinate activities of other
entities within CMT and RMT.
There is one ECM entity per Station or Concentrator.
Physical Connection Management
The Physical Connection Management (PCM) initializes the
connection of Ports and manages the Signaling Sequence
between each physical connection.
The PCM uses the Line States available in the PHY to perform the Signaling Sequence.
There is one PCM entity for each Port.

Media
Access
Control
(MAC)

Ring Managomont
(RMT)

--il--------} --f- --Configuration
Control
Managemont
(CCM)

~

::E

~

0

e

i

"

~

Configuration
Conlrol
Element
(CCE)

~
"'""
"

'"

Physical
layer
Protocol
(PHY)

Physical
Connoctlon
Managemont
(PCM)

:8"

"

"
~
0

I

0

...

0

:$

..."

Physical

!
I
I

Medium

Optional Optical Bypass
Switch Conlrol

I

Dopendenl
(PMD)

Connection Management (CMT)

TL/F/ll080-2

FIGURE 2. RMT and CMT Entities

4-38

2.3 Frame Services
Frame Services is the management entity in SMT that is
responsible for providing a number of frames that may be
used to gather information and control the stations attached
to the network. These frames are used in SMT protocols
which collect information for higher-level management entities.
Frame Services are used by the Management Agent Process to:

-

ECM performs the Trace function by invoking the
PCM to transmit the appropriate Line States.

• Disconnects the PMD from the network
• A Path Test function is used to test all the components
and paths within a node. Since the test occurs entirely
within a node and cannot be verified, it is considered an
implementation dependent issue and is not specified by
the Standard.
The Path Test is used to ensure that the node will operate
correctly once it joins the ring. It is also used to determine
if the node causes errors on the ring.
For example a Path Test can include the following steps:

• Gather statistics
• Detect, isolate, and resolve network failures
• Tune performance
• Change topology

• Test all accessible data paths within the node
• Perform loopback testing of the PHY as close as possible to the PMD interface

3.0 Basic SMT Framework

• Confirm parameters provided to the MAC: addresses,
timer values, etc.

All entities within SMT, Connection Management, Ring Management, and Frame Services, are operated based upon
the following inputs:

• The MAC recovery process for this node including the
resolution of the Beacon and Claim Processes

• Signals from higher level management
• Internal conditions'triggered by the expiration of timers
• Signals received from other stations on the network
Since SMT is considered as an intelligent entity, the higher
level management does not need to control every level of
operation within SMT. Rather, SMT will perform the necessary procedures and protocols to accomplish a task requested when the ,higher layer management entities set the
appropriate signals (Connect, Disconnect, Reset, etc.).

Physical Connection Management
PCM is initialized by the PC_Start signal from the ECM.
PCM provides the following services:
• Initializes a physical connection. The physical connection
procedure is performed at the PHY Layer as follows:
- Determines that a neighboring PHY exists
-

3.1 CONNECTION MANAGEMENT
CMT controls the Physical Layer (PHY and PMD) and the
Configuraiton Control Element which connects the MACs
and PHYs within a station or concentrator.
The operation of CMT is based upon the requests from SMT
which in turn come from a higher level of management. The
requests used to control CMT are:

Determines that the neighboring PHY has the correct
PC_Type to establish a legal connection between the
two Ports. [In a typical network configuration, there
are two types of legal connections: A to B (Dual Attach Stations on dual rings) and M to S (Single Attach
Station connected to a Concentrator).]

• Runs the Link Confidence Test. The Link Confidence
Test is used to determine if the link quality is adequate for
ring operation. Its aim is to detect major link quality problems, not to determine the exact Link Error Rate.

• Connect Request: this request is used to signal the Physical Layer to connect to or disconnect from the network
(signals Connect and Disconnect).

The Link Confidence Test is performed in the PCM State
Machine before the link is allowed to join the ring. A minimum Link Confidence test requires the transmission of
Idle symbols for a period of 50.0 ms providing that the link
has not had any recent link quality problem. Errors that
occur during the testing period are recorded. If the number of errors recorded exceeds the acceptable error rate,
the test fails. Otherwise, the link is considered to have
passed the Link Confidence test.
The result of the Link Confidence Test is reported to higher level management. If the link fails the test, it will continue to be tested until the test is passed or until higher level
management disconnects the link.
Once the Link Confidence test has been completed successfully, the link is ready to be included in the network.
The PCM then signals the CCM to connect the appropriate MACs and PHYs together within a station.
The Link Error Monitor (LEM) is used to examine the link
error rate of an active link. The LEM function complements the initial Link Confidence test to monitor the link
quality once it has joined the ring.
LEM is performed by SMT using the facilities available in
the PHY.

• Control Request: this request is used to signal the CMT
to perform certain operations or to report status.
CMT communicates with SMT via Status Indication which is
used to report CMT status changes.
Entity Coordination Management
The ECM is initialized when the CMT receives a Connect
Control Request from SMT.
The services provided by the ECM Entity are:
• Connects the PMD to the network when CMT is initialized:
- Allows the Transmitter and Receiver to begin to transmit and to receive.
- Once the Fiber Optic Transmitter and Receiver are
ready, a signal is set to initialize the PCM.
• Starts the Trace process to localize a Stuck Beacon condition based on the Trace_Prop signal from the Ring
Management or Physical Connection Management entity.
- After the ring is stuck in the Beacon state for a period
of time (:20 8.0 seconds), a signal is set to begin the
Trace process.

4-39

Once the Trace function has been completed, it will indicate the result to ECM.

Link Error Events are counted to produce the LEM.-CT
count. A Threshold test is used to compare the current
Link Error Rate with the cutoff and alarm Link Error Rate
thresholds.

• Supports Maintenance.
In the Maintenance state, the PCM can transmit any
sequence of symbols. This feature is useful to ensure
that the PHY Transmitter can transmit all the symbols in
the FDDI Code. It is also used to force the other end of
the connection into a particular state manually without
going through the Connection Sequences.

Once the LER reaches the alarm LER threshold, SMT
reports the status to higher level management. If the LER
is equal to or greater than the cutoff LER thresholds, the
link is automatically removed from the ring and this event
is reported to higher level management.
• Performs the Trace function.
Upon the reception of signal PC_Trace from ECM, PCM
transmits the appropriate Line States required by the
Trace function.
The Trace function provides a recovery mechanism for
Stuck Beacon conditions on the FDDI ring. Whereas PCM
is designed to recover from most physical faults that occur between two nodes, the Trace function is intended to
provide recovery from a Stuck Beacon condition which
cannot be localized to a single link.

Configuration Control Management
The CCM is initialized by the CF---Join signal from the PCM.
The services provided by the CCM Entity are:
• Inserts Single Attachment Station or Concentrator to the
Primary Path.
• Connects the MAC of Dual Attachment Station or Concentrator with a Single MAC to the Primary Path.
In this configuration, all Dual Attach Stations with one
MAC are connected to the Primary Ring. Only Dual Attach
Stations with two MACs can transmit and receive frames
on both the Primary and Secondary Rings.

The Trace function causes all stations and concentrators
in the suspected fault domain to leave the ring and complete a Path test, so that the fault may be localized. The
fault domain is defined as the area between the Beaconing MAC and its nearest upstream neighbor MAC.
The Trace function is performed as follows:

Single Attach Stations are connected to the Primary ring
as the default configuration.

• When a station enters the Beacon State, a timer is reset.
If the station is still in the Beacon state when the timer
expires, a Stuck Beaconing condition has occurred and
the RMT sets the Trace_Prop signal to the ECM to initialize the Trace function.
-

The Trace function starts at the node with the Beaconing MAC and traverses to the nearest upstream
MAC.

-

The ECM controls the configuration information and
sets the PC_Trace signal to the appropriate PCM.
When a PCM receives a PC"":'Trace signal, it tral]sitions to the Trace state to transmit a special line
state that indicates Trace.
The Port at the other end of the link receives the
"Trace" Line State and will set the Trace_Prop flag
to indicate that the Trace function is to be propagated upstream.

-

-

-

When the Trace Line State arrives at a Port that is
connected to the input of a MAC, the Trace has
been completed.
The node with the MAC that receives the Trace removes itself from the ring from Path Test.
The removal of this node causes the node downstream from it to remove itself also.
Thus, all nodes in the Trace domain will eventually
remove themselves from the ring to perform Path
Tests. This process should take less than the
Trace_Max timer value (7 seconds).

• Performs the Scrub function.
The Scrub function is used to remove PDUs sourced by
MACs that no longer form part of the same token path.
These MACs may have been removed from the token
path internally within its node or due to a network topology change. It is controlled by the CEM entity.
The Scrub function removes left over PDUs after a reconfiguration to ensure that aU PDUs on the ring have been
created since the last reconfiguration.
The Scrub function may be performed by using one of
several mechanisms listed below.
-

Transmit Beacon or Claim frames for a sufficient time
while the input to the MAC is blocked (stripping old
frames while transmitting Beacon or Claim frames)

-

Transmit Idle symbols for a sufficient time while discarding input stream received at the PHY. This method may be used for a node that does not have a MAC
after reconfiguration.

-

Frames can also be stripped by the node that is performing the Scrub function. '

3.2 RING MANAGEMENT
RMT manages the basic information and condition of each
MAC. The operation of RMT is based upon the control request from SMT, which in turn comes from the higher level
of management. This request is used to signal RMT to reset, to change the basic information in the MAC, or to report
its status. RMT is also responsible for initiating fault recovery actions to recover the ring.

If the Trace function has not been completed within the
Trace_Max time, the process has failed and manual intervention is required.

4-40

Based on the Upstream Neighbor Address provided in NIF
frames, a station can then build a ring map of the stations'
locations and their connections to other stations.
There are three types of NIFs: Announcement, Request,
and Response.

RMT communicates with SMT via the Status Indication
which is used to report its status changes.
Services provided by RMT are:
• Identification of a Stuck Beacon condition
If the ring remains in the Beaconing state for a long time
(~ B.O seconds), the Stuck Beacon condition has occurred. RMT will report this error condition to higher level
management as well as starting a new error recovery
mechanism.
RMT uses a timer (T_Stuck) to keep track of the Struck
Beacon condition.

• Announcement
A NIF Announcement frame is broadcast to the entire ring.
A station can choose to transmit a NIF Announcement or
NIF Request. If a NIF Announcement is to be transmitted, it
will be sent every 30 seconds when the ring is operational
and under zero load conditions.

• Initiation of the Trace function
Once the ring has been identified to be in the Stuck Beacon condition, RMT starts the Trace function by setting
the Trace_Prop signal to ECM.

• Request
A NIF Request is sent to a station, a group of stations, or
the entire ring. The NIF Request announces the station's
information while requesting that the corresponding station(s) respond with a NIF Response.
If an NIF Request is to be transmitted, it will be sent every
30 seconds when the ring is operational, under zero load
conditions.

• Notification of MAC availability
After the CCM sets the RM_Join signal to indicate that
the MAC is connected to the appropriate PHY in a station
(or concentrator), the RMT can then set the
MACJvaiiable signal to higher level management to indicate that the MAC is ready to transmit and receive data.

• Response
A NIF Response is sent in response to a NIF Request.
Upon receiving a NIF Request, a station is required to send
a NIF Response within 30 seconds if the ring is operational,
under zero load conditions.
In addition to the Upstream Neighbor Address, the NIF Response frame also provides the Downstream Neighbor Address, and the mechanism to detect Duplicate Addresses.

• Detection of Duplicate Addresses
By observing the order in which Beacon and Claim
frames are received at the MAC, RMT can detect Duplicate Addresses which can prevent the ring from becoming operational.
Upon detecting this condition, RMT will notify higher level
management of the condition. It will also take actions to
resolve the Duplicate Address problem.

Resource Allocation Frame
A Resource Allocation Frame (RAF) is defined to support a
variety of network policies for allocation of resources. At this
point, only the Synchronous Bandwidth is identified as the
only resource supported by the Resource Allocation
Frames. However, the protocol can also be used to support
other types of resource allocation which have yet to be
specified in the Standard.

• Resolution of Duplicate Address Problem
One of three possible solutions can be taken by RMT to
eliminate the Duplicate Address problem:
1. Change the MAC's address to a unique universal address
2. Change the bidding time to guarantee that this station
will lose the Claim Process

Request Denied Frame
A Request Denied Frame (RDF) is used to respond to optional frames that the station does not support. It is also
used to respond to an SMT frame with a Version ID that this
station does not support.

3. Remove the station from the ring
3.3 FRAME SERVICES
A number of frames are specified as SMT frames. These
frames are used to gather information and control the operation of the stations on the network. There are four types of
mandatory SMT frames:

Status Report Frame
The Status Report Frame (SRF) is used to periodically announce the station's status which may be of interest to the
Network Administrator.

• Neighbor Information Frame
• Resource Allocation Frame
• Request Denied Frame

Two types of information are included in the SRF: Conditions and Events. Conditions include the station state which
may be of interest to a network manager as long as the
condition remains asserted. Events are instantaneous occurrences which are of interest to a network manager.

• Status Report Frame
Neighbor Information Frame
A Neighbor Information Frame (NIF) is used by a station for
periodic announcement of its basic operating information.

4-41

~r---------------------------------------------------------~

z~
cc

Although these connections are considered legal, higher
level management needs to be notified so that the link can
then be rejected.

4.0 Optional Protocols
Aside from the mandatory functions listed in Section 2.0,
FDDI SMT also provides many optional protocols that can
be implemented in addition to the mandatory ones.

• LInk Confidence Test
Aside from the minimum Link Confidence Test described in
Section 3.4, other types of Link Confidence tests can be
performed.
The two PHYs of the link need to agree beforehand which
type of Link Confidence test is to be carried out. This information is exchanged via a bit in the PCM Signaling Sequence.

4.1 CONNECTION MANAGEMENT
Entity Coordination Management
ECM has two optional features, the Optical Bypass Switch
Control and Hold Policy.
• Optical Bypass Option
The Optical Bypass is used to allow a Dual Attachment Station or Concentrator to be inserted and deinserted from a
dual ring without disrupting the operation of the ring.

Other Link Confidence tests to be considered include the
following:
• Transmitting PDUs and counting link errors. Errors are
detected and counted at the PHY.

If the Optical Bypass Option is available, the ECM allows for
the switching time of the optical bypass switch during the
Insertion process. It also allows time for the optical bypass
switch to deinsert during the Deinsertion Process.,

This Link Confidence test requires at least one MAC connected to one of the two PHYs.
• Transmitting PDUs and counting Frame Check Sequence
errors. Errors are detected and counted as frame errors
at the MAC.
This Link Confidence 'test requires at least one MAC connected to one of the two PHYs.

• Hold Policy Option
When the Hold Policy is invoked, it prevents the dual rings
from wrapping when a fault occurs on one of the two rings.
The Hold Policy may be used in Dual Attachment Stations
and Concentrators.

• Looping back symbols received from the other end of a
connection and counting link errors on reception. Errors
are detected and counted at the MAC.
This Link Confidence test is performed at the PHY layer.
The length of the Link Confidence Test can be:

The Hold Policy is useful in preventing the disruption of a
ring when an error occurs on the other ring of the dual rings
(disruption occurs when the ring attempts to wrap).
Physical Connection Management
PCM has the following two optional Features

• Short (50.0 ms)
• Medium (500.0 ms)

• Physical Connection
In a normal dual ring of trees structure, there are two types
of physical connections between two ports: A-B (A port to
B port) and M-S (Master port to Slave port). In addition to
these two connections, other connections can also be acceptable as legal:

• Long (5.0 sec.)
• Extended (rio maximum time specified)
The length of the Link Confidence test is indicated by two
bits of the PCM Signaling Sequence.

• A port to A port (A-A)
• B port to B port (B-B)
• A port to Master port (A-M)
• B port to Master port (B-M)
• Slave port to Slave port (S-S)
The A-A and B-B connections may be used when two Dual
Attachment Stations are connected together to form a ringlet (a dual ring with two stations).
The A-M and 8-M connections may be used when a Dual
Attachment Station is used as two Single Attachment Station. In this case, the station can only be connected to the
ring via a Concentrator. This scenario is called Dual-Homing.

Configuration Control Management
Aside from the Primary Path, there are two other optional
paths available in CCM: Secondary and Local.
• A PHY or a MAC can be connected to the Local Path.
While connected to the Local Path, these entities are removed from the ring and can be used to perform local
testing.
• A Single Attachment Station can initially be connected to
the Secondary Path. Single Attach Stations can then
choose to transmit and receive frames on either the Primary or Secondary ring depending upon the initial connection.
• The MAC of a Dual Attachment Station with a Single
MAC can also optionally be connected to the Secondary
Path. Stations with one MAC can then choose to transmit
and receive frames on either the Primary or Secondary
ring.

The S-S connection may be used to connect two Single
Attachment Stations together to form a link. The two stations thus form a single ring.

4-42

r----------------------------------------------------------------,~

4.2 FRAME SERVICES
The following SMT frames are provided by the Frame Servo
ices to gather status and control the nodes on the ring:
o Station Information Frames

The structure of the ESF is defined by the owner of the
Extended_Type.

o Echo Frames
o Extended Service Frames
o

Status Report Frames

o Parameter Management Frames

Station Information Frame (SIF)
Station Information Frames (SIFs) are used to request and
provide, in response, a station's configuration and operating
information. There are two classes of SIFs: Configuration
and Operation.
o

Extended Service Frame
The Extended Service Frame (ESF) can be used to test new
SMT services that are intended for inclusion in later versions of the FDDI SMT document.

Configuration SIF

Parameter Management Frames
The Parameter Management Frames (PMF) are used to get,
change, add or remove parameters in a node. There are 4
classes of PMFs: PMF Get, PMF Change, PMF Add, and
PMF Remove.
There are two types of frames for each class: Request and
Response.
PMFs are transmitted with an optional authorization code to
provide a type of security check.

A station can request a station, a group of stations, or all
stations on the ring to respond with its (their) configuration
information using the SIF Configuration Request. The transmission of these Request frames is optional.
A station is required to respond to SIF Configuration Request frames with a SIF Configuration Response frame within 30 seconds of receiving a Request frame, under zero load
conditions. Stations can also deny the request by sending
back a Request Denied Frame.

PMFGet
A station can issue a PMF Get Request Frame to query the
value of one or a group of attributes in the Management
Information Base (MIB) of an individual, group, or all stations.
The receiving station can respond with the current value of
the requested attributes. If the protocol is not supported, a
station can transmit a Request Denied Frame in return.

The SIF Configuration Response provides the configuration
structure of the node by describing the connections of the
PHYs and MACs within the node. It is used to build the full
ring map (both logical and physical).

PMFChange
A station can issue a PMF Change Request Frame to
change the value of a single attribute in the Management
Information Base of an individual, group, or all stations.
The receiving station can act to change the requested attribute. It can then respond with a PMF Change Response. A
station could also transmit a Request Denied Frame in return.

o Operation SIF

A station can request a station, a group of stations, or all
stations on the ring to respond with its (their) operation information using the SIF Operation Request. The transmission of these Request frames is optional.
A station is required to respond to SIF Operation Request
frames with a SIF Operation Response frame within 30 seconds of receiving a Request frame, under zero load conditions.
The SIF Operation Response provides the operating parameters in a node; information such as timer values, counter
values, etc. It is used to detect faults by monitoring the station's status and counter values.
Echo Frames
A station can request another station on the ring to re-transmit a test pattern using the Echo Request Frame (ECF).
This test pattern is stored in the Information field of the
Echo Request Frame.
Upon receiving the Echo Request Frame, the recipient
builds an Echo Response Frame and sends it to the Request Frame's Source Address.
The Response Frame is required to be transmitted within 30
seconds after receiving the Request frame if the ring is operational and there is zero load. The recipient can also send
a Request Denied Frame instead of the Response Frame.
Echo Frames can be used to test for data-sensitive network
failures by placing the suspect data pattern in the Echo Information field. It can also confirm that a station's Port,
MAC, and SMT are partially operational.

PMFAdd
A station can issue a PMF Add Request Frame to add a
value of a single attribute in the Management Information
Base of an individual, group, or all stations.
The receiving station can act to add the requested value. It
can then respond with a PMF Add Response. A station
could also transmit a Request Denied Frame in return.
PMF Remove
A station can issue a PMF Remove Request Frame to remove the value of a single attribute in the Management Information Base of an individual, a group, or all stations.
The receiving station can act to remove the requested value. It can then respond with a PMF Remove Response. The
station could transmit a Request Denied Frame in return
instead.

5.0 National's FDDI Chip Set
National's DP83200 FDDI Chip Set has been designed to
provide maximum support to the Station Management functions. Both the PLAYER and BMAC devices have separate
management interfaces via the Control Bus. Furthermore,
each chip has many registers on-board to provide the information required by the different SMT entities.
5.1 PLAYER DEVICE
Connection Management
The Connection Management Entities (ECM, PCM, and
CCM) can control the operation of the PMD and PHY using
the registers available on the PLAYER Device.

4-43

ZI

......

N

en

• Entity Coordination Management
The user can control the operation of the PMD by setting or
resetting bits 4 to 7 of the MODE Register.
• Physical Connection Management
The PCM Signaling Sequence can be implemented using
the Current Transmit State Register and Current Receive
State Register in the PLAYER device.
Line States can be transmitted by setting the appropriate
bits in the Current Transmit State Register. Line States received can be monitored observing the Current Receive
State Register.
Furthermore, a historical record of the Line States received
is kept in the Receive Condition Registers. This information
is useful for keeping track of the Signaling Sequence.
The Noise Threshold and Noise Prescale Threshold Registers are used to ensure that the noise conditions do not
persist beyond the maximum tolerated level.
• Configuration Control Management
Using the Configuration Register, the CCM can control the
connection of the PHYs and MACs in a node. Each PLAYER Device can be connected to the Primary Path, Secondary Path, and Local Path. In addition, it can also be connected to the PHY Invalid Bus where the PLAYER Device can
continuously transmit PHY Invalid to the ring or indicate
PHY Invalid to the entity it is connected to internally within
the node (I.e., a BMAC Device or another PLAYER Device).
The PLAYER Device can be configured via the Configuration Register without external logic.
Link Error Monitor
SMT can use the following registers to perform the Link
Error Monitor functions once the PLAYER Device is connected to the ring:
• Current Noise Count Register
• Current Noise Prescale Count Register
• Link Error Threshold Register
These registers enable the user to implement different
methods of monitoring link errors according to their requirements.
Loopback
The PLAYER Device can be programmed to perform Internal or External Loopback. These Loopback operations are
useful during Path Testing.
The Internal Loopback mode can be used to test the functionality of the PLAYER Device or to test the data path between the PLAYER and BMAC Devices.
The External Loopback mode can be used to test the functionality of the PLAYER Device and to test the data paths
between the PLAYER Device, Clock Recovery Device, and
BMAC Device. This mode is especially useful when the Path
Test requires testing as close to the PMD as possible.
5.2 BMAC Device
The BMAC Device provides extensive ring and station statistics via the on-board Timer and Counter Registers. Furthermore, it can internally generate Claim and Beacon
frames that are used in the FDDI MAC Protocol to detect
errors.

Timers and Counters
Information can be provided to RMT and other SMT entities
to represent the operating status of the node using the following Counters and Timers:
•
•
•
•
•

Late Count Counter
Frame Received Counter
Error Isolated Counter
Lost Frame Counter
Frame Copied Counter

• Frame Not Copied Counter
• Frame Transmitted Counter
• Token Received Counter
• Ring Latency Counter
• Negotiated Target Rotation Timer
• Maximum Token Rotation Timer
• Valid Transmission Timer
• Asynchronous Priority Threshold
The information provided can then be transmitted to other
stations on the ring in the Station Information Operation Response Frame and Status Report Frame.
Loopback
The BMAC Device can be programmed to perform loopback
testing.
There are three Self-Test Paths:
• Internal to the BMAC Device
• Through the PLAYER Device(s)
• Through the CRD Device
These paths allow the user to perform Path Tests on the
BMAC, PLAYER, and CRD Devices.
Stripping Protocol
A special stripping protocol can be invoked by asserting the
STRIP signal (pin 13). The stripping protocol starts with the
transmission of two My_Void frames at the end of a current
service opportunity. The stripping will continue until a
My_Void frame returns. The stripping protocol can be invoked when the initial token is issued after a successful
Claim to remove all fragments and ownerless frames from
the ring as required by the Scrub function of the Configuration Control Management entity.
Inhibit Recovery
By setting bit 3 of the Option Register, the MAC can be
prevented from entering the Claim state.
This option is useful in allowing the ring to recover from the
Duplicate Address scenario where two stations with the
same address also have the winning Claim frames. By prohibiting one station to enter the Claim state, the other station can then win the Claim process thus allowing the ring to
become operational.
Claim and Beacon Frames
The BMAC Device reports the reception of a Claim or Beacon frame by setting the appropriate bit in the Ring Event
Latch Registers.
By keeping track of the received Claim and Beacon frames,
the user can then determine if the Error Recovery process
(Claim or Beacon) has succeeded or failed.

4-44

Duplicate Address Detection
Upon the detection of a Duplicate Address, the BMAC Device reports the incident by setting the appropriate bit in the
Ring Event Latch Registers.

Duplicate Token Detection
Upon the detection of a Duplicate Token, the BMAC Device
reports the incident by setting the appropriate bit in the Token and Timer Event Latch Register.

6.0 Summary
The Station Management (SMT) facilities, an essential part
of an FDDI network, provide a rich set of tools to manage an
FDDI network. As a summary, the Connection Management
services of SMT manage the configuration of the station
and the link between the station's Ports and their neighboring Ports; the Ring Management facilities provide control of

the MACs of a station in the FDDI rings; the Frame Services
provide a tool to manage the complete FDDI network, the
services are the most flexible and extensive part of SMT.
The implementation of Station Management software can
be rather complicated without adequate support from the
hardware. As a result, the National Semiconductor Corporation DP83200 FDDI Chip Set integrated many essential
functions on the chip set and provides maximum support to
FDDI Station Management functions. The PLAYER Device
and the BMAC Device support the Connection Management
services and the Ring Management service respectively.
The BSI Device provides separate Station Management
channel and data frame channels for the maximum support
of the SMT Frame Services. The invaluable Station Management features in the DP83200 Chip Set can shorten the
Station Management software development cycle and provide higher reliability of the FDDI network.

•
4-45

I

~

,------------------------------------------------------------------------,

~ A Guide to the
cc Implementation

National Semiconductor
Application Note 727
My Le, Michael Yip

z

of Physical Connection
Management .
1.0 Introduction
The FDDI Station Management (SMn standard provides
the necessary control of an FDDI station (node) so that the
node may work cooperatively as a part of an FDDI network.
To effectively implement the functions required, SMT is divided into three entities, namely the Connection Management entity (CMn, the Ring Management entity (RMT) and
also the Frame Based Services. The Connection Management is further divided into three entities, the Physical Connection Management (PCM), Configuration Element Management (CEM), and Entity Coordination Management
(ECM).
The Physical Connection Management is an entity within
Connection Management whose functions include:
• Initialization of the connection of neighboring ports pair
where each port is comprised of one PMD entity and one
PHYentity.
• Enforcement of port connection policies and withholding
of unacceptable connections
• Testing of link confidence and monitoring of link quality
between neighboring ports
• Detection of physical connection level faults between two
ports and invocation of path test
• Support of maintenance line state
• Participate in the Trace action
For a general description of SMT, please consult the application note entitled "SMT Simplified", AN-726.
In this document, the operation of the Physical Connection
Management entity is described along with a guide to the
implementation of the PCM using the PLAYERTM device. In
addition, one implementation of the Link Error Monitor using
the PLAYER device is also discussed. For a more detailed
description of PCM and other SMT entities, please consult
the ANSI FDDI Station Management Standard.

2.0 PCM Functions Overview
Many instances of PCM can exist on a FDDI node and each
instance of PCM controls one port in a node. For example,
two separate instances of PCM exist in a Dual Attached
Station (DAS) and only one instance of PCM exists in a
Single Attached Station (SAS). Each PCM communicates
with the ECM and CEM entities and directly controls the
PHY layer device of a port.
One of the most important functions of PCM is to establish a
connection between two ports. The connection process is
achieved through a lock-step handshaking procedure. The
handshaking procedure controlled by PCM is divided into
three stages:
• Initialization sequence
• Signaling sequence
• Join sequence

The initialization sequence is used to indicate the beginning
of the PCM handshaking process. It forces the neighboring
PCM into a known state so that the two PCM state machines can run in a lock-step fashion.
Following the initialization sequence is the signaling sequence. The signaling sequence communicates information
about the port and the node with the neighboring port. A
Link Confidence Test (LCn is also conducted during the
signaling sequence to test the link quality between the two
ports. If the link quality is not acceptable or the type of connection is not supported by the nodes then the connection
will be withheld.
If the connection is not withheld during the signaling sequence, the PCM state machine can move onto the join
sequence and establish the connection between the two
neighboring ports.
In addition to establishing the connection, PCM also supports the Maintenance function and performs the Trace
function. During the Maintenance function, PCM forces the
PHY layer device to transmit a specified line state continuously. The Maintenance function allows SMT to force the
PCM of the neighbOring port into a known state manually
and line faults may be traced when both end nodes are in
known states and do not change state due to line noise.
The operation of PCM can be implemented by a state machine. The state machine is comprised of ten states: Off,
Break, Trace, Connect, Next, Signal, Join, Verify, Active and
Maintenance. The next section of this document describes
the PCM State Machine.

3.0 Detailed PCM Description
3.1 CONNECTION SEQUENCE
The connection sequence starts with the reception of the
PC_Start signal from the Entity Coordination Management.
PC_Start indicates that the physical media is available for
communication. The PC_Start signal causes the PCM state
machine to enter the Break state which is the beginning of
the initialization sequence.
In each sequence the two PCM state machines exchange a
sequence of line states. The PCM state machine sends the
line state to its neighboring PCM by directing the PHY layer
devices to transmit a continuous stream of line state symbols. This line state is transmitted for a duration of time to
ensure that the neighboring PCM receives the information.
While transmitting, the PCM state machine also expects to
receive a particular line state from the neighboring PCM. If
things go as planned, the connection progresses through
the three sequences and PCM Signals the Configuration Element Management entity to include the connection into the
token path.

4-46

:I>
The remainder of this section describes the detail operation
of each sequence in the connection process.

Join Sequence
The final stage of the connection sequence is the join sequence. The join sequence is comprised of three states running in sequence. The three states are Join state, Verify
state and finally the Active stage. The join sequence is a
unique sequence of transmitted symbol streams received as
line states (HLS-MLS-ILS) that leads to an active connection. At the end of the join sequence, the PCM state machine signals the CEM entity and CEM will incorporate the
connection into the token path.

Initialization Sequence
The Break state and the Connect state are used in the initialization sequence to start the connection.
The Break state is the entry point in the start of a PCM
connection. In the Break state, a continuous stream of Quiet
Symbols is transmitted to force the other end of the connection to break any existing connection and restart the connection sequence. The Break state is entered upon the reception of the PC_Start signal from ECM or other PCM
states when external events force a reinitialization of the
connection. Reinitialization is required if the Link Confidence Test fails, the expected line state is not received, a
noise condition occurs for a period of time, or the neighboring port is forced to break the connection.

....z•
~

The PCM state machine enters the Join state when the signaling sequence finishes exchanging the ten bits of information. After the tenth bit is transmitted, the PCM state machine enters the Next state. The reception of Idle line state
in the Next state causes the PCM state machine to transition to the Join state. In the Join state, a continuous
stream of Halt symbols is transmitted.

When Quiet line state or Halt line state is entered during
Break state, the connection has been initialized successfully
in the Break state and the PCM state machine can transition
to the Connect state. The Connect state is used to synchronize the two ends of the connection to begin the signaling
sequence. In the Connect state, a continuous stream of Halt
symbols is transmitted for a sufficient amount of time for
clock acquisition by the receiving PHY.

The reception of Halt line state in the Join state causes the
PCM state machine to transition to the Verify state. In the
Verify state, a continuous stream of Halt-Quiet (Master)
symbol pairs is transmitted.
The last state of the connection sequence is the Active
state. The reception of Master line state in the Verify state
causes the PCM state machine to transition to the Active
state. In the Active state, a continuous stream of Idle symbols is transmitted. Upon the reception of Idle line state in
the Active state, the PCM state machine directs the PHY
device into the Active Transmit Mode, which transmits the
PDUs from the PHY device's request port.

Signaling Sequence
The second stage of the connection sequence is the signaling sequence. The Next state and the Signal state is used in
the signaling sequence to exchange port information with
the neighboring PCM. Link Confidence Test and/or MAC
Loop Back Test are also performed during the signaling sequence.

Many timers are used to ensure the connection sequence
proceeds in lock-step fashion on the two ports of the link.
The timers used in PCM are listed in Section 5.3 together
with a brief explanation of each timer. The state diagram of
the PCM state machine and a list of PCM states are also
presented in Section 5.1.

The PHY line states are used to signal bit information and
provide handshaking during the signaling. During the signaling sequence, three line states are used. The Idle line state
is used as a bit delimiter, the Halt line state is used to represent a logical one (set) and the Master line state is used to
represent a logical zero (clear). If Quiet line state is entered
during any part of the signaling sequence, the PCM state
machine should make a transition to the Break state and
restart the connection sequence again. During the signaling
sequence, ten bits of information are exchanged with the
neighboring PCM. Section 5.2 has a list of the format of the
10 bits of information.

3.2 MAINTENANCE FUNCTION
The Maintenance state is used to perform the Maintenance
Function. In the Maintenance state, the symbol stream
specified by higher level management agent shall be forced.
During the Maintenance state, the PCM state machine is
insensitive to the received line state.
The Maintenance state is useful to ensure that the PHY and
PMD devices can transmit all the symbols specified in the
FDDI standard. The Maintenance state is also used to force
the other end of the connection to a particular state manually (without going through the Connection Sequence).

The Initialization sequence leaves the PCM state machine in
the Connect state while the PHY Port is transmitting Halt
symbols. The reception of Halt line state in the Connect
state causes the PCM state machine to transition to the
Next state. The signaling sequence starts upon the first
transition to the Next state. In the Next state, a continuous
stream of Idle symbols is transmitted. The Next state is
used to separate the bit Signaling performed in the Signal
state.

3.3 TRACE SUPPORT
Trace support is needed to localize a Stuck Beacon condition. The Trace function is used to recover from the Stuck
Beacon condition by propagating the Trace signal along the
ring, causing all the stations and concentrators in the suspected fault domain to leave the ring and perform a Path
Test. In the Trace state, a continuous stream of Halt-Quiet
(Master) symbol pairs is transmitted to the upstream station.

The reception of Idle line state in the Next state causes the
PCM state machine to transition to the Signal state. In the
Signal state, a continuous stream of Halt symbols or HaltQuiet (Master) symbol pairs are transmitted. Therefore one
bit of information is transferred each time when the Signal
state is entered. The reception of Halt line state or Master
line state in the Signal state will cause the PCM state machine to transition to the Next state again. The Next state
and Signal state cycle repeats ten times to exchange all ten
bits of information in the Signaling sequence.

Two possible sequences of events can cause the PCM
state machine to enter the Trace state. In the first case, the
reception of Master (or Trace) line state in the Active state
causes the PCM state machine to send the Trace_Prop
signal to ECM. ECM will direct the appropriate PCM state
machine to transition to the Trace state by sending the
PC_Trace signal to that PCM. Upon the reception of the
PC_Trace Signal, a continuous stream of Halt-Quiet (Master) symbol pairs is transmitted.

4-47

•

~ r-------------------------------------------------------------------------------~

C'I

I';Z
011(

The LCT can be performed using one of the following methods:
• Transmit Idle symbols and count link errors. The error
measurement is taken from the PHY device.
• Transmit valid PDUs and count link errors. Again, the error
measurement is taken from the PHY layer device.
• Transmit valid PDUs and count Frame Check Sequence
(FCS) errors from the MAC frames. In this method, the
MAC layer device is used to source the PDUs and also
take error measurements.
• The PHY will reiransmit what is received and the transmitter will check for link errors. This method requires at least
one MAC device connected to the link to send PDUs. The
error measurement is taken from the PHY layer device.
Because multiple levels of the LCT can be performed, a
minimum capability of transmitting Idle symbols and counting link errors is required for each port.

The second situation that causes PCM state machine to
enter the Trace state is a bit more involved. When the Ring
Management entity detects a Stuck Beacon condition, RMT
sends the TraceJrop signal to the ECM. Like the first
case, the ECM entity will direct the appropriated PCM state
machine to transition to the Trace state.
3.4 Link Confidence Test
The Link Confidence Test (LCT) tests the link quality before
the link is inserted into the token path. If the link quality is
not adequate for ring operation then LCT will fail. Failure of
LCT will cause PCM to return to the Break state and the
connection is reinitialized. As a result, the LCT and the
whole connection sequence will be repeated until the LCT is
passed. The LCT is intended to detect major link problems
and not to determine the exact Link Error Rate.
The Link Confidence Test is performed after bit 6 is transmitted in the Signaling sequence. During the duration of the
test, either Idle symbols or valid PDUs are transmitted. The
reception of Master line state signifies the successful completion of the LCT, while the reception of Halt line state
signifies the failure of the LCT. If Quiet line state is entered
during the LCT, the test is aborted and PCM returns to the
Break state.
The duration of the LCT and the type of LCT is determined
by the bit signaling process in the Signaling sequence. LCT
is defined to have four durations, namely LC_Short
(50 ms), LC_Medium (500 ms), LC_Long (5 sec) and LC_
Extended (50 sec). When a port is started the first time, it
requests the shortest test duration. Every time the LCT fails,
the duration is increased up to a maximum duration of LC_
Extended. If the two ports on the link request different LCT
duration in the Signaling sequence, the longer LCT duration
is used to ensure a better measurement of link quality.

3.5 LINK ERROR MONITOR
The Link Error Monitor (LEM) continuously examines the
link error rate (LER) of an Active connection. Its function
complements the LCT to ensure that the link quality is adequate for ring operation at all times. When the LER exceeds
the cutoff value, the connection is flagged as faulty and
shall be removed from the token path.
The LEM and LER are based on the link error count from
the PHY level device. However, the implementation of LEM
and LER is not specified in the FDDI SMT Standard. One
way of calculating LER is to keep a running time average of
link error events occurred in a given time period. See Table I.

TABLE I. Link Error Rate (LER) Calculation Example
Time
(In ms)

LEC
in

Starting
Time

Ending
Time

Total Time
(In ms)

Total
LEC

LER
(In BIt/Sec)

T+100
T+200
T+300
T+400
T+500
T+600
T+700
T+BOO
T+900

0
1
0
0
0
2
1
0
0

T
T+100
T+100
T+200
T+300
T+400
T+500
T+600
T+700

T+100
T+200
T+300
T+400
T+500
T+600
T+700
T+BOO
T+900

100
200
300
300
300
300
300
300
300

0
1
1
1
0
2
3
3
1

 T.Out
THEN BreakCondi tion = TRUE, Done = TRUE
07 End Loop i f Done = TRUE
08 Wait (TL.Min)
09 IF BreakCondi tion = TRUE
THEN DO BreakAction
10 IF LSF1ag = TRUE
THEN TxLS = RCode (n) , CTSR = TxLS

The LETR value is loaded into the LEM counter when a
value is written to the LETR or when the internal LEM counter reaches zero. When the internal LEM counter reaches
zero, an interrupt condition is generated. The interrupt condition is registered in the Interrupt Condition Register. If the
corresponding bit (Bit4) in the Interrupt Condition Mask Register is also set, an interrupt is generated.
Current Link Error Count Register
The Current Link Error Count Register (CLECR) serves a
function similar to the Current Noise Count Registers. The
CLECR takes a snap shot of the internal LEM counter, thus
allowing the control process to read the LEM counter without interrupting the LEM counter. The CLECR can be used
to calculate the Link Error Rate and it is also needed in the
Link Confidence Test during the PCM connection sequence.

FIGURE 1. Polling Technique Example Code
Let's examine the code in more detail. Line 01 instructs the
PLAYER device to transmit Idle symbols. Line 02 is the beginning of the polling loop which ends at line 07.

State Threshold Register and
State Prescale Threshold Register
The State Threshold Register (STR) and the State Prescale
Threshold Register (CPTR) are used to set the threshold
value of the internal 15-bit state counter. The state counter
counts the duration that the PLAYER device receives a line
state.
The State threshold Register is a 7-bit register. It forms the
most significant bits of the state counter threshold value.
The State Prescale Threshold Register is an 8-bit register. It
forms the least significant bits of the state counter threshold
value. Like the Noise Threshold Registers, the STR and
SPTR together can specify a threshold value of 2.62 ms.
When the internal state counter reaches zero, the State
Threshold (Bit1) is set to one, therefore, an interrupt can be
generated.

In the polling loop, line 03 polls the CRSR register and
stores the received line state in the variable RxLS. If received line state is Quiet line state, line 04 sets the BreakCondition variable to indicate the PCM state machine needs
to return to the Break state. If the received line state is
Super Idle line state, it sets the variable LSFlag, indicating
that the correct line state is received. Super Idle line state is
tested instead of Idle line state because it is required to wait
for at least 12 Idle symbols in the Next state before any
action. Line 06 checks for the time out condition to ensure
the state machine does not get stuck in the Next state waiting for Idle symbols. The polling loop is repeated until one of
the conditions is met.
After existing the polling loop, the PCM state machine has
to wait for 30 ms (TLMin) before starting the next action
(Line 08). It is used to make sure that the PHY device on the
other side has enough time to recognize the line state symbols. If the BreakCondition is TRUE, line 09 will transit to the
Break state by executing a subroutine BreakAction. If everything is fine and the expected line state is received, the
PCM Psuedo Code machine determines the next transmission mode and directs the PCM state machine to transmit
the new line state symbols.
During the polling loop, the PCM software needs to monitor
the Current Receive State Register very frequently so that
line state information will not be missed. Failure to recognize all the changes of line state can cause failure in the
connection sequence and reinitialization of the connection.

The internal state counter can be used to keep track of the
length of time a particular line state is required to be transmitted or received before the PCM state machine can take
appropriate actions. For example, while the PCM state machine is in the Next state, the State Counter can be set at a
threshold of 1.6 ms to ensure that the state machine has
sent a sufficient number of line state symbols in the Connection state before it moves to the Next state.

4-51

l>
Z

..:...

N

......

~

~
~

r-------------------------------------------------------------------~

At this point, the PLAYER device is ready to receive new
line states. Line 14 sets up the mask for RCRA so that when
the expected line state is received, an interrupt can be generated. The value 0010 1111 written to RCMRA in this example allows the PLAYER to watch for Halt line state, Master line state, Quiet line state and also the Noise condition.
All these are required in the Next state. Line 15 clears the
mask for RCRB. This line is not necessary since RCMRB is
cleared at the beginning of the code. It is only included as a
reminder for other PCM states.
The next line state is finally transmitted in line 16. After the
new line state is transmitted, this code segment ends and
returns to the calling process.

4.3 INTERRUPT TECHNIQUE
The interrupt technique can also be used in implementing
the PCM software. This section explains a simple sample of
a portion of the PCM software using the interrupt capability
built in to the PLAYER device.
The code segment shown in Figure 2 is part of an interrupt
handler that responds to the line state reception during the
signaling sequence. It serves the same purpose as the'code
shown in the previous section.
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17

RCMRA

=O.

RMMRB

=0

tmp = ICR
tmp = tmp AND 1001 0000
ICR = tmp

4.4 OTHER TECHNIQUES
Interrupt and polling are by far the most popular techniques
used to implement PCM software. However, implementation
of the PCM software is not limited by the two techniques.
One other approach is to use the interrupt technique together with an event queue schedular.
The mix design that uses the interrupt technique and the
event queue provides less interrupt handling time and decouples the interrupt handling code from the PCM software.
When an event or line state occurs and an interrupt is generated, the interrupt handler unmasks the interrupt condition
and enqueues the line state event into the event queue.
Events in the event queue are taken care of one after another outside of the interrupt handling routines.
Many more possible designs can be used to Implement
PCM with the PLAYER device. The implementations depend on the underlying hardware platform and cannot be
covered by this paper.

RxLS = CRSR
IF RxLS = QLS
THEN DO BreakAction. RETURN
IF RxLS = lLS
THEN
TxLS = RCode(nl.
tmp = RCRA. RCRA = O.
tmp
RCRB. RCRB
O.
RxLS = CRSR.
RCRA = RCRARxMsk [RxLsl.
RCRB = RCRBRxMsk [RxLsl.
RCMRA = 0010 1111.
RCMRB = 0000 0000.
CTSR = TxLS .
RETURN
FIGURE 2. Interrupt Technique Example Code

=

=

Line 01 is first line of this part of the interrupt handler. The
interrupt handler has to examine the device and condition
that generates the interrupt before executing the code.
Lines 01 to 04 stop the PLAYER device from generating the
interrupt. It first stops the interrupt condition by clearing both
RCMRA and RCMRB. Then, it clears the Receive Condition
A (Bit5) and the Receive Condition B (BitS) in the Interrupt
Condition Register. Note that the ICR Is a conditional write
register, as a result, it is read in line 02 before a value is
written to it.
Lines 05 to 07 decide what to do with the received line
state. If the current line state is Quiet line state, BreakAction
is executed and this section of the interrupt handler is com·
pleted. However, if the received line state is Idle line state,
the interrupt handler needs to prepare the PLAYER for the
reception of the next line state and also transmits the next
line state.

5.0 Appendix
This section provides explanations and definitions of terms
needed to help understand PCM. However, the ANSI SMT
document shall be used as the standard reference. The
State diagram from the ANSI SMT document is reprinted in
Figures 3 and 4.
5.1 PCM STATES
The PCM State Machine is comprised of ten states. Section
4.1 explains the meaning and functions of each PCM state.
PCG: Off State
The Off state is the initial state of the PCM State Machine.
The PCM returns to this state upon the reception of the
PC_Stop signal from the Entity Coordination Management
Entity (ECM).

It first runs the PCM Psuedo Code machine by calling the
subroutine RCode(n), where n is the nth bit during the sig·
naling sequence. Lines 09 and 10, prepare the reception of
the next line state by clearing the registers RCRA and
RCRB. However, clearing all the line states in the RCRA
and RCRB register means that the current line state information is also cleared from the two registers. As a result,
the line state that PCM is expecting may also be erased.
Lines 11 to 13, prevent such a condition by writing the current line state information back to RCRA or RCRB.

In the Off state, the PMD optical transmitter is optionally
disabled and the PHY device is required to transmit Quiet
symbols.
PC1: Break State
The Break state is the entry point of the PCM connection
sequence. The Break state is entered upon the recepiion of
the PC_Start signal from ECM. The Break state is also entered from any other state when the connection sequence
cannot be completed and a reinitialization is required.
In the Break state, the PMD optical transmitter is disabled
and the PHY device is required to transmit Quiet symbols. A
few variables are also cleared and intialized during the
Break state.

4-52

PCO:OFF

PC1:BREAK

From st.t.s 0 to S:
PC( 00 ) -PC (SO)

PC-St.rt
Br •• Uclions

PC9:MAINT

CD

OILActions
PC_Stop
PC_t.l.int(m.inUs)
PC(09)
!.f.inLActions @

From st.t.s 0 to S:
PC(01)-PC(S1)

CD

PC.J:n.bl. PC(90

PCJlis.bl.
OILActions

CD

From .11 st.t.s:
PC(09)-PC(99)

PC.J.t.int(m.inUs)
PC(99) - - - - - : : " . ,
M.inLActions

@I

PC3:CONNECT

PC4:NEXT

T10>lS_J.fln &. not lS....FI.g PC( 44.)
I
SET lS_FI.g
PC5:SIGNAL lS....FI.g &. not RC....FI.g &. TPC>TLMin PC(44b)
SET RC....FI.g; PC....RCod.(n)....Actions
PUS = HlS &. not lS....FI.g
PC_Sign.1
PC(55.)I+------...;..;;==-=---PC(45)
SET lS....Fl.g; SET U.I{n)
l~igFI:~c¥P~~T@Min

r------

'I

PC-LS = MlS &. not lS....FI.g
...------PC(55b)
SET lS....Fl.g; CLEAR fLV.I(n)

PC(54)-~~=O"';;'~;...;.;:~----~

®

INC n; N.xLAclions
PC....POR
PC(44c)
ISM....PHJ.INE-STATE,r.qu.st{TRANSMIT....POR)
TD....FI.g &. not TC....FI.g &.
(PC_lS=(HlS or t.tlS) or TPC>LN.xt{n»
SET TC....FI.g; PC TCod.(n)....Actions
PC( 44d)

I

Br •• k-R.quir.d ®
1+----""--:::PC(51)
Br •• Uctions CD
PC6:JOIN
Br •• k-R.quir.d ® or (PC_lS = IlS &. lS....FI.g)
1+-----....:...-.....::::..........:....----:------....::.:. PC(61)
PC Join
PC(46)
Br •• k....Actions CD
Join....Actions TLMin
,,®PC(67)
V• .,fy_Act,ons S

PUS = HlS &. not lS....FI.g
PC(66)-::::::-:-::-:::----,
SET lS_FI.g
I

®

PC8:ACTIVE

Br •• k....R.qulr.d
or
PC{7S)-----..;;l...;S....F;;..;;;I."'g...;&..;.,TP.;.,..;;C->TLt.I=;:::i~n---_+I
(PC-LS = IlS &. not LS....FI.g)
Acliv• ....Aclions
1+-----;:::-PC(71)
TIO>lS_t.tin &. not LS....FI.g
PC{SS.)
Br•• k_Actions
I
SET LS....FI.g

®

CD

not TlLFI.g &. (PUS=HlS or RE..FI.g &. (Br•• k....R.quir.d

® or LEt.I....F.iI or TNE>NU.x»

1+--------------=~-------PC(SI)

CD

Br •• k....Actions
PC2:TRACE
TPC>Tl_Min &. LS FI.g &. not CF _Join
(
)
PC_lS = (OlS or HlS) &.
1SET CF_Join
PC BBb
not lS....FI.g &. P.lh_T.st = P.ss.d
SM PH lINE-STATE,r.qu.st(TRANSMIT POR)
PC(22.) SET P.th_T.sI = P.nding
lS....FI.g &. PC-LS = MLS &. not TR....FI.g
PC_LS = MlS &. not lS....FI.g &. not TR....FI.g
SET TR FI.g; SET Tr.c. Prop PC(SSc)
PC{22b) SET LS FI.g; SET Tr.c. Prop I

I

1+___________--'p~C;;;;T~r.::.c:.:·:..",,_ _ _ _ _ _ _ _ PC(82)
TraceJ.ctions

®

FIGURE 3. PCM State Diagram

4-53

TL/F111081-1

.....
C'II
r;-

Physical Connection Management Footnotes.

Z

1. OILActions:
SM_PM-CONTROLrequest(TransmiLOisable)'
SM_PH_Line-State.request(TRANSMIT_QUIET)
CLEAR CF_Loop
CLEAR CF---Join
CLEAR BS_Flag

T_Out)
Optionally. BreaLRequired may include the condition TNE> NS_Max:
PC_LS=QLS or (not LS_Flag & TPC> T_Out) or TNE> NS_Max
12. RestarLRequired:
PC_LS=QLS or (not LS_Flag & m"O & TPC>T_Out)
Optionally, RestarLRequired may include the condition TNE>NS_Max:
PC_LS=QLS or (not LS_Flag & ",00 & TPC>T_Out) or TNE>NS_Max

13. Transitions effected by the BreaLRequired or RestarLRequired conditions shall take precedence over other transitions. The reception of QLS while in
states 4 to B shall cause the PCM to transition to the Break State within PC_React time.

14. RESET TPC on every transition. This includes transitions where the destination state is the same as the originating state.
*This primitive is not required for all PMD implementations.

FIGURE 4. PCM State Diagram Footnote

4-54

Upon the reception of Quiet line state or Halt line state, the
PCM state machine leaves the Break state and enters the
Connect state. If the state machine is stuck in the Break
state for a long time (TB_Max), the state machine sets the
BS_Flag so that other management agents can examine
the condition and takes the appropriate action.

Once each individual bit has been transmitted and received,
the state machine moves to the Next state before returning
to the Signal state for the next transmission. Thus the Next
state is used as the bit delimiter between two signaling bits.

PC2:Trace
The Trace state is used to localize the fault domain of a
Stuck Beacon condition where the ring cannot recover from
its Beacon state. The state machine enters the Trace state
when receiving the PC_Trace signal from ECM while in the
Active state.
During the Trace state, the PHY entity transmits a stream of
Halt-Quiet (Master) symbol pairs.

PC6: Join State
The Join state is the first of three states in the join sequence
that leads to an active connection. The join sequence assures that both ends of a connection enter the Active state
together at the completion of the sequence.
The Join state is entered upon the completion of the signaling sequence when the PC---Join signal is issued from the
Psuedo Code machine. In Join state, a continuous stream of
Halt symbols is transmitted.

When all signaled bits have been transmitted and received,
the Signaling Sequence ends.

The only way to leave the Trace state is receiving the
PC_Start or PC_Off signals from ECM.

PC7: Verify State
The Verify is the second of three states in the join sequence. The Verify state is entered when Halt line state is
received when the state machine is in the Join state.

PC3: Connection State
The Connection state is used to synchronize the two ends
of the connection to begin the signaling sequence. It is also
used for clock recovery since the Break state does not
transmit any clocking information through the optical transmitter.
In the Connect state, the PMD level optical transmitter is
enabled and a continuous stream of Halt symbols is transmitted.
Upon the reception of Halt line state, the state machine
leaves the Connect state to the Next state. If Idle line state
is received before Halt line state, then the connection is not
synchronized and the state machine transmits to the Break
state to restart the connection sequence.

A continuous stream of Halt-Quiet (Master) symbols pairs is
transmitted during the Verify state.
PCB: Active State
The Active state is the last of three states in the join sequence. In this state, the port is incorporated into the token
path.
On initial entry into the Active state, a continuous stream of
Idle symbols is transmitted. Upon the reception of Idle line
state during the Active state, the PHY device is allowed to
enter the Active Transmit Mode and PDUs presented to the
PHY Port Request interface can be transmitted.
In addition to the normal break conditions, when Halt line
state is received in place of Idle line state, the connection is
not synchronized and a reinitialization of the connection is
required. If the Link Error Rate is too high, the connection
also needs to be reinitialized upon entering the Active state.

PC4: Next State
The Next state is one of the two states used in the signaling
sequence. The main purpose of the Next state is to separate the "bit" signaling performed in the Signal state. The
Next state is also used to transmit PDUs while MAC Local
Loop or Link Confidence Test is performed. The PCM PSl!edo Code machine is also started in the Next state.
On initial entry into the Next state, a continuous .stream of
Idle symbols is transmitted. While in the Next state, either a
continuous stream of Idle symbols or PDU symbol stream is
transmitted.
The Next state terminates and the state machine transits to
the Signal state upon the reception of Halt or Master Iilne
state or when the PC_Signal signal is received from the
Psuedo Code machine. The state machine transit to the
Break state upon the reception of Quiet line state.

PC9: Maintenance State
The Maintenance state is tr.led to perform the Maintenance
function. The Maintenimce state is entered upon the reception of the PC_Maint or PC_Disable signal from other
management agency.
5.2 PCM PSEUDO CODE
The PCM Pseudo Code provides and processes the information that Is sent between the neighboring PCMs during
the signaling sequence. As mentioned in the previous sections, the information is communicated via the bit signaling
technique whereas a bit value is represented by a stream of
line state symbols. The Halt symbols are used to represent
a logical one and the Master symbols pairs for a logical
zero.
This section explains the meaning of the ten bits of information communicated during the signaling sequence.

PC5: Signal State
The Signal state is one of the two states used for the signaling sequence. In the Signal state, individual bits of information are communicated across the connection by transmitting either Halt symbols or Halt-Quiet (Master) symbols pair.
Transmitting the Halt symbols is equated to the transmission of a logical one and the transmission of the Master
symbols pairs is a logical zero.

Blt{O): Escape Bit
Bit(O) is called the Escape Bit. It's value is zero for SMT
Version 6.2. The setting of Bit(O) is reserved for future assignment by the standard.

II
4-55

~

~

Z

c(

r---------------------------------------------------------------------------------,
Blt(1,2): PC_Type
Bit(1) and 'Bit(2) together state the PC_Type of this port.
The four PC_Types defined in the FOOl standard are encoded as shown in Table V.
TABLE V. PC rype Encoding

Blt(7): LCT Failed
Bit(7) is set to indicate that the Link Confidence Test was
failed by this end of the connection.
If either side signals that the LCT failed, the connection is
restarted and a long Link Confidence test is used next time.

-

PC_Type

Blt(1)

Blt(2}

0
0
1
1

0
1
0
1

PHY-A
PHY_B
PHY_S
PHY_M

Blt(8): MAC for Local Loop
Bit(8) is set to indicate that this end of the connection will
provide a MAC for the MAC Local Loop. MAC Local Loop
may optionally be used to verify MAC recovery processes,
token passing and the neighbor notification process.
If neither side set Bit(8), then the MAC Local Loop is omitted. If this end does not support MAC Local Loop and the
other end does, this end of the connection has the option of
not performing the MAC local Loop.

The PC_Type is communicated during the signaling sequence so that the connection policy can be enforced be,fore the station is inserted into the token path.
Blt(3): Port Compatible

Blt(9): MAC on Port Output
Bit(9) is set to indicate that this end of the connection intends to place a MAC in the output token path.

Bit(3) is set to one if the two ports on the link are compatible
which means that this connection is allowed and supported
by both stations. Connections that are not allowed are withheld until Bit(9) is received and a PC_Start signal is generated to reinitialize the connection. All the conne,ctions are
allowed in the standard except a M-M connection, however
certain types of connection can be rejected depending on
the implementation.

5.3 PCM TIMERS AND
TIMER EXPIRATION VALUES
There are only a few timers used in PCM to determine the
length of certain operations and the time in which an appropriate response is expected However, one timer can have
different expiration values depending on the state of the
PCM software.
For most of the time, the timers are used to measure the
maximum timer to wait for the reception of certain line
states, the minimum duration to transmit certain line states,
the duration for LCT, etc. Therefore, the timer operations
help to ensure the two PCMs are synchronized.
The following timers are employed in PCM:

Blt(4,5): LCT Duration
Four durations of Link Confidence Test are allowed and
Bit(4) and Bit(5) specify the LCT duration suggested by this
port. If the suggested values from the two ports are different, then the longer duration is used for the Link Confidence
Test. The LCT duration is encoded into Bit(4) and Bit(5) as
shown in Table VI.
TABLE VI. LCT Duration Encoding
LCT
Duration

Blt(4)

Blt(5)

Short
Medium
Long
Extended

0
0
1
1

0
1
0
1

TPC
Physical Connection Timer is the main timer that PCM uses.
It is used to ensure state transitions proceed at the desired
rate.
TID
The Timer for Idle Detection is used by PCM to measure the
time of continuous ILS reception.

The Short LCT duration is used when' there is no recent
history of excessive link errors. The Medium LCT duration is
used when a failure in LCT occurred. The Long LCT duration is used after the rejection of a link due to an excessive
Link Error Rate. And finally, the Extended LCT duration is
used when LCT is used to withhold an undesirable connection.

TNE
The Timer for Noise Event is used by PCM to detect the
length of noise events. If an excessive number of noise is
received, the PCM state machine can optionally reinitialize
the connection by moving to the Break state,
The rest of this section lists the timer expiration values used
in the PCM state machine. All of the expiration values are
used for TPC timer unless specified otherwise. The default
value is also highlighted for the ease of referencing.

Bit(6): MAC Available for LCT
Bit(6) is set to indicate that a MAC will be placed at this end
of the connection during the Link Confidence Test.

PC-React: 3.0 rns
PC_React states the maximum timer for PCM to make a
state transition to the Break state when the connection
needs t6 be restarted. The reinitialization of the connection
is needed upon the reception of Quiet line state, when a
fault condition is detected, or PC_Start is presented.

If the other port on the link does not have a MAC available
for the Link Confidence Test, then this end may optionally
source valid PDUs.
If this end cannot connect to a MAC during the Link Confidence Test, then this PHY device is configured to repeat
any received PDUs.
Note that LCT is performed after Bit(6) is communicated,
during the Next state.

4-56

TB-Mln:ems
The minimum time that PCM transmits Quiet symbols and
receives Quiet line state during Break state. This value is
rather large because PCM has to wait for the other end to
response.

NLMax: 1.3 ms
The maximum time that noise is tolerated before the connection is considered to be unreliable and needs to be restarted. This timeout value is based on the TNE timer.
5.4 SIGNALS
A signal is used to initiate a state change within PCM. It is
also used to communicate with other SMT entities. The signals can be generated by PCM or other entities.

TBJax:50 ms
The maximum time the state machine is allowed to remain
in the Break state before an error flag (BS_Flag) is set to
indicate that the PCM is stuck in the Break state.

The following signals are used in PCM:

C_Mln: 1.6 ms

PC_Start

The minimum time the state machine is required to send
Halt symbols after the reception of Halt line state during the
Connect state. This timer is used to assure that the other
end of the connection has recognized the Halt symbols being transmitted in the Connect state.

A signal that is set by the Entity Coordination Management
Entity (ECM) to PCM. PC_Start is used to signal the PCM
to initialize a connection.
PC_Start is also signaled by PCM when the Link Confidence Test fails and the connection is re-initialized.

LLMln: 480 ns
The minimum time of continuous reception of Idle line state
before Idle line state is recognized by the PCM state machine. The duration of LS_Min is greater than or equal to
12 symbol times to ensure robustness. This expiration value
to be used in the Next state and the Active state. It is measured by the TID timer.

PCJaint
A signal that is set by a higher-level management entity to
PCM. PC_Maint is used to signal PCM to enter the Maintenance state.
PC_Trace
A signal that is set by ECM to PCM. PC_Trace is used to
signal PCM to enter the Trace State.

TLMln: 0.3 ms
TLMin is the minimum time to transmit a line state before
advancing to the next state. It is used in the following states:
Next. Signal. Join. Verify and Active. The TLMin value is
set to twice the time required for a line state to be recognized by the PHY device in the other end of the link.

PC_Stop
A signal that is set by ECM to PCM. PC_Stop is used to
signal PCM to enter the Off state.
PCJnable
A Signal that is set by a management entity to PCM.
PC_Enable is used to signal PCM to move from the Maintenance state to the Off state.

T_Out: 100 ms
T_Out specifies the Signaling timeout value. It is defined as
the minimum time the state machine is required to remain in
a state to wait for the line state reception before reinitializalion of the connection.
The expiration of T_Out indicates that a line state change
is expected but did not happen. the connection has failed
and needs to be re-started in the Break state.

PC_Disable
A signal that is set by a management entity to PCM.
PC_Disable is used to signal PCM to move from any state
to the Maintenance state.
PC_Signal
A signal that is set by PCM for its internal use during the
Signaling Sequence. PC_Signal is used to indicate that the
next value is available and ready for transmission.

TJext(n): 100 ms
T_Next(n) is the same as the T_Out values but it is used
in the Next state since LCT and MAC Local Loop is to be
performed during the Next state. T_Next(n) specifies the
timeout value for the nth bit in the signaling sequence.
T_Next(7) and T_Next(9) specifies a different timeout value other than the default ones.

PC_PDR
A signal that is set by PCM for its internal use. PC_PDR is
used to indicate that a PDR is to be transmitted.
PC-",oln

TJext(7): LCT Duration
The T_Next(7) value is the negotiated value of the Link
Confidence Test duration after the Signaling of Bit(4) and
Bit(5). It can take on one of the following values: LC_Short
(50 ms). LC_Medium (500 ms). LC_Long (5.0 sec) or
LC_Extended (50 sec).

A signal that is set by PCM for its internal use. PC--!oin is
used to indicate that the Signaling Sequence has been completed successfully and the Join Sequence is started.

T_Next(9): 200 ms
The maximum time for the optional MAC Local Loop to be
performed. This timer is used to prevent deadlock while allowing sufficient time for MAC recovery process completion
and exchange of neighbor information frames.

II
4-57

~

~

:i

r---------------------------------------------------------------------------------,
5.5 PCM FLAGS AND VARIABLES
A flag is a variable that shall take one of two values: set(I)
or cleared(O). Flags are used to reflect the status of the
state machine and also to signal other entities of the PCM
status.
Variables can take on a wider but still a limited set of values.
Variables serve the same function of Flags.
The following is a list of flags and variables used in PCM:

PCJelghbor
A variable that is set by PCM to other management entities.
This variable is set to indicate the PC_Type of the PHY at
the other end of the connection. PC_Neighbor is set during
the signaling sequence.
PC_Neighbor can have one of five values: A, B, S, M, or
None.

PC_MAC_LCT

A variable that is set from PCM to other management enti·
ties. This variable is set after the signaling sequence has
been completed to indicate the mode of physical connection that has been performed.
PC_Mode can have one of three values:
Peer
PC_Mode is set to Peer when neither the port
under control or the port at the other end are of
type M. It indicates that this connection exists
within the trunk ring.

PC_Mode

A flag that is available internally to PCM. This flag is used to
indicate that a MAC will be used for the Link Confidence
test.
PC-MAC_Loop
A flag that is available internally to PCM. This flag is used to
indicate that the MAC Local Loop will be performed before
the connection is made active.
CFJAC
A flag that is set by the Configuration Control Management
(CCM) to PCM. This flag is used to indicate that a MAC is
available for the Link Confidence test or MAC Local Loop.

Tree

None

BS-Flag
The Break State Flag (BS_Flag) is set by PCM to indicate
that the PCM state machine is not leaving the Break state in
an expected time interval and a problem is suspected. It can
be used by other management agencies to indicate a prob·
lem in PCM or the link that needs to be resolved.

PC_Withold
A variable that is set by PCM to other management entities.
This variable is used to indicate the reason the connection
did not get incorporated in the ring.
PC_Withold can have one of the following three values:
None, Port M to Port M, or Other incompatible Port Types.

LEMJaii
A flag that is set by PCM to other management entities. It is
set to indicate that the Link Error Rate exceeds the
LEA-Cutoff threshold. The flag is cleared when the Link
Error Rate Threshold test is passed. It is used to remove
connection with excessive Link Error Rate.

MalnLLS
A variable that is set by other management entities to PCM.
This variable is used to indicate the symbol stream to be
transmitted when the PCM is in the Maintenance state.

PC_Type

MainLLS has one of the following values: Quiet, Halt, Idle,
.Master or PDR.

A variable that is set by the higher level management agen·
cy to PCM. It is used to specify the type of port being man·
aged by the PCM.
Four different ports are defined:
A

The port in a Dual Attachment Station or Concentrator
which attaches to the Primary In and Secondary Out
when attaching to the dual ring.

B

The port in a Dual Attachment Station or Concentrator
which attaches to the Secondary In and Primary Out
when attaching to the dual ring.
The port in a Single Attachment Station (SAS) or one of
the port in a Single Attachment Concentrator (SAC).

S
M

PC~ode is set to Tree when orie of the port is
of type M. It indicates that the connection exists
with a concentrator tree.
The connection is neither of the two previous values. PC_Mode is set to None when the connection type is yet unknown.

PC_LS
A variable that is set by PCM to another management entity.
This variable is set to indicate the line states received by the
PHY.
PC_LS can have one of the following values: QLS, HLS,
MLS, ILS, ALS, NLS or LSU.
PC_LCT_Faii
A variable that is set by PCM to other management entities.
This variable is used to indicate the number of consecutive
failures of the Link Confidence Test.

n

The port in a Concentrator that is used to connect with
aSASorSAC.

A variable that is set by PCM for its internal use. This variable is used to indicate the number of the next value to be
signaled in the Next state and the current value being signaled in the Signal state.

4-58

.

l>
National Semiconductor
Application Note 728
Robert M. Grow, Jim Schuessler

fDOI Station Ma.nagement
with the Na.tional Chip Set
1.0 INTRODUCTION
The National OP83200 FOOl Chip Set includes special features that aid in the management of an FOOl station as well
as the management of an FOOl ring. An attempt is made
here to guide you through some of the details of Station
Management (SMT) using National's OP83200 FOOl Chip
Set with as little pain as possible. Special circumstances for
non-standard applications are also discussed.
Oue to the universally acknowledged complexity of the
FOOl Standard, it is always a wise idea to have ready access to the original documents when reading collateral material-this is no exception! We recommend obtaining the
ANSI X3T9.5 FOOl Standards set1.
The BMACTM device and PLAYERTM device are two of the
devices comprising the National OP83200 FOOl Chip Set.

They both provide a rich set of fully maskable interrupts.
These interrupts are used to drive SMT protocols, including
Frame Based Management, Connection Management and
Ring Management. The BMAC device includes counters for
fault isolation and station and ring performance monitoring
that ease the implementation of SMT protocols. The PLAYER device includes multiplexing capability to implement the
node configurations called out in the SMT Configuration
Management state machine (the most popular being a Single Attach Station (SAS) and Oual Attach Station (OAS)),
internal hardware for link error monitoring, and noise timing
(see Figure 1). The full duplex architecture of the chip set
provides for comprehensive testing and fault isolation.

DP83261 BMAC DEVICE (BASIC MEDIA ACCESS CONTROLLER)
IJ SMT multicast addressing on·chip
IJ Full duplex architecture
IJ Auto generation of Beacon and Claim frames
IJ Multiple transmit immediate modes

[]
[]
[]
[]

Multiple diagnostic counters
Ring latency timer
4-bit late counter
Same information field detection for MAC frame filtering
IJ Ouplicate address detection
[] Multiple token detection
DP83251 155 PLAYER DEVICE (PHYSICAL LAYER CONTROLLER)
IJ On-chip configuration switch

[] Line state history registers
IJ Link error detector
IJ Noise threshold timer
IJ Unique injection register
IJ Full duplex architecture

FIGURE 1. National DP83200 FDDI Chip Set SMT Features

1 There are four documents comprising the FDDI Standard: PMD, PHY, MAC and SMT. The first three are published standards available through ANSI (phone:
212·6424900), the last, SMT, is still in draft form at the publication time of this Application Note. It can be obtained through Global Engineering Documents,
phone 800·854·7179, or 714-261-1455.

4-59

z

......
N

co

co
N

":"

z

CC

r---------------------------------------------------------------------------------,
A simplified Claim Process flow is shown in Table I:

Four general areas of management will be discussed in this
paper: how to select values of operational parameters, how
to use the BMAC device for fault isolation, how to use the
PLAYER device for implementing Connection Management
(CMn, and how to monitor network status and performance.

TABLE I. Timer Values In the Claim Process

2.0 OPERATIONAL PARAMETERS
FDDI supports a broad range of network configurations, and
the FDDI standard specifies default parameters for operation of large configurations. The National FDDI Chip Set is
designed to operate over an even larger range of configurations for special applications. The default values of these
parameters must be changed for larger configurations. In a
few systems, it is also valuable to optimize parameters in
small ring configurations.
At the core of the timed token protocol implemented in the
BMAC device are timers used to control the transmission of
information on the network and to detect when ring recovery is required. These timers are loaded with values which
ultimately determine the performance of the ring. Ring recovery/startup is a function which can be performed by the
BMAC device automatically with default timer values. Other
values for these timers can be loaded, but be warned:
changing these values from the defaults may cause poor
performance, (high usable token latency or low throughput)
or worse yet, oscillation between Claim and operational
states. For instance, a shorter Valid Transmission Timer
(TVX) value might be used on a small ring to accelerate ring
recovery, but if the shorter value was used on a large ring it
could cause the above problems.

Value

Becomes

Value

TREQ
Shortest Tbid
TNEG

-+
-+
-+

Tbid in a station's Claim frames
TNEG in all stations
Token Rotation Timer (TRn
when the ring becomes
operational

Note: See Recovery Required in MAC Standard

The BMAC device is capable of automatically generating
Claim frames. It starts the Claim Process when TVX times
out or Tlate = 2 (Tlate is a 4-bit counter which increments
once each time TRT goes to zero). When the frames are
transmitted, the BMAC device places the TREQ value
stored in the BMAC device Parameter RAM into the Claim
frame. This value then becomes Tbid to the next station on
the ring. The receiving BMAC device saves the Tbid from
the Claim frame as the potential TNEG, while comparing it
to its TREQ. If the received Tbid time is shorter than its own
TREQ, it stores the Tbid value as its new TNEG, stops
transmitting Claim frames and repeats incoming Claim
frames. If the received Tbid is larger than the current TREQ,
the station keeps (or starts) transmitting its current Claim
frame. The Claim Process completes when the BMAC device receives Claim frames with both source and destination
address equal to its own, (its own Claim frame) as well as
the Tbid value equal to its TREQ. This process insures that
the shortest Tbid value of any node participating in the
Claim process ends up as TNEG for all nodes. If an implementation externally generates Claim frames instead of letting the BMAC device generate them, then it is very important that TREQ in the BMAC device Parameter RAM be
equal to the first four bytes of the Claim frame (Tbid). If this
isn't done, the Claim Process may not complete, and a false
duplicate address condition may be detected by the SMT
Ring Management protocol.

In most cases, the operation and performance of FDDI is
determined by the most demanding (typically the shortestl)
parameter in all stations on the ring. For example, the station with the shortest TVX value will frequently be the station starting a Claim Process. This is because any timed out
TVX will cause the BMAC device to start the Claim Process
(TVX timeout indicates no frame received within TVX time).
When powering up, or after a hardware reset, the BMAC
device has been designed to revert to default values for
many critical parameters; though, a station must initialize
the Parameter RAM before participating in an FDDI ring.
Parameter RAM values include the long and short addresses, for example.
The use of the BMAC device's programmable timers is discussed below to help illustrate the different alternatives for
management of the parameters and selection of proper values for desired operational characteristics.

2.2 Selection of TREQ
Two major factors are used in selecting a TREQ value. The
first is the delay and segment size for synchronous traffic.
The second is the desired queuing delay for all traffic, both
asynchronous and synchronous. 3 The first factors: delay
and segment size are just another way of specifying the
throughput necessary for the synchronous application. The
data source is usually isonchronous (periodic) and therefore
must be serviced or "disaster" will strike. (An example might
be voice data, where a delay would result in a noticeable
blank spot in continuous speech.)
An application must be able to rely on the stability of TNEG,
therefore, TREQ should not be changed frequently. It is
generally a bad idea to change TREQ as application processes start and stop. In fact, there are really only two reasons for changing TREQ from the default TMAX: To create
a synchronous service period, or to adjust the asynchronous
maximum usable_token latency-both relate to token latency.

2.1 The Claim Process
Claim is a ring state which must be completed before the
ring can become operational. The objective is to create an
interoperable environment in which all stations may communicate with both asynchronous and synchronous traffic. The
process does this by setting the ring's Target Token Rotation Time (TTRn and determining who will issue the first
token (the "winner" of claim). Following FDDI rules for the
Claim Process, the station with the shortest Requested Target Rotation Time (TREQ) is the "winner", and will determine the Negotiated Token Rotation Time (TNEG) for the
ring. TNEG is used as the operational value for the Token
Rotation Time (TRn in all stations on the ring.2

3 For B discussion of Asynchronous versus Synchronous traffic, see the

ANSI X3T9.5 FOOl MAC Standard.

2 In many cases, stations will have the same TREQ value. In this case other
information in the Claim frame is used to select the "winner".

4-60

2.2.1 Selection of TAEQ for Synchronous Traffic

20 ms Case:
28 bytes overhead + 200 bytes data = 228 bytes/
frame-12% overhead
228 bytes/frame • 50 frames = 11,400 total bytes
(10,000 bytes data)

Changing TNEG, and thus TRT, has significant implications
on synchronous traffic. Synchronous service is usually
viewed as some number of bits per second; but in FOOl,
synchronous service is provided in bytes per token rotation.
Each time a token is received, a station may transmit X
bytes based on its synchronous allocation. The total synchronous bandwidth allocation for the ring may not exceed
TNEG less overhead. 4
A synchronous application will generally determine the
bandwidth requirement on application layer (OSI Layer 7)
data; but the synchronous allocation requested in SMT protocols must include overhead for placing the application
data in a frame. A change in TNEG changes the framing
overhead. This is because the number of bytes of overhead
is the same for 1 byte of application data or 4 kBytes of
application data. Since an objective of synchronous service
is to guarantee bandwidth to an application, a shorter TTRT
will cause the application data to be segmented into smaller
sizes. So as TNEG is lowered, response time decreases
(faster token rotation) but overhead increases and therefore
overall throughput decreases. This is the tradeoff between
response time and throughput.

There is a 37% decrease in bandwidth in the 5 ms TRT
case verses the 20 ms TRT.
If other protocol information like an LLC is transmitted on
each frame, the increase would be even worse. In addition,
a change in TNEG also creates ring stability problems for
previously enqueued synchronous information. Frames
which are queued at 20 bytes, for example, would cause the
ring to go into the Claim Process if enough of them were
queued when TRT changed to a lower value requiring 50
byte frames.
Synchronous service is not well specified in current FOOl
documents. If each synchronous application is allowed to
pick its own TREQ, then as applications start and stop,
TNEG will increase or decrease. In most cases, it is better
for an application to learn what the synchronous target time
is and segment to that size, rather than dynamically changing it as applications start and stop. This Simpler model of
operation can be handled in the ring's synchronous bandwidth allocation algorithm.

For example, the synchronous requirement for an application layer requiring 10,000 bytes per second above the MAC
layer would increase 37% on MAC overhead alone when
TNEG changes from 20 ms to 5 ms. A little math will illustrate this.
Remember that all bytes transmitted must be counted in the
synchronous allocation. The fixed bytes of overhead per
frame are shown in Table II.

All this is to say that applications (OSI Layer 7) should not
specify or have control over TREQ. Synchronous allocation
should be done by a process which has global knowledge of
the throughput and latency requirements of all stations.
SMT is uniquely qualified for this purpose.
2.2.2 Selection of TAEQ for Asynchronous Traffic
Asynchronous traffic is not effected significantly by the value of TNEG in typical systems. Here, the desired TNEG is
based on a tradeoff between network throughput and response time. For example, on a large ring of 150 stations (n)
at 1 p.s latency per station, the maximum throughput is 99%
at 20 ms. TNEG, and 97% at 5 ms TNEG.

TABLE II. Fixed Bytes of Overhead per Frame
Number
of Bytes

Portion
of Frame

8
1
1
12

2

Preamble
SO (JK Symbol)
FC
Addresses: SA, OA
OATA
FCS
EO

28

Total

...
4

n(TNEG - Ring Latency)
n(TNEG) + Ring Latency = Percentage Throughput
Therefore: 150 (20 ms - 150 p.s)/(150(20 ms)
= 99%
and:

150 (5 ms - 150 p.s)/(150(5 ms)
= 97%

+

+

(1)

150 p.s)

150 p.s)

Another important performance characteristic is the maximum usable_token latency. Usable_token latency is the
time for a token to return to a particular station, and be
usable for asynchronous traffic. This means the TRT has
not timed out once since the station last saw the token.
(This is opposed to maximum token latency which is 2 times
TNEG, a much smaller time.)

If TRT is 20 ms that means the token will circulate 50 times
per second (1/20 ms) at the maximum network utilization.
Our requirement is for 10,000 bytes/s which means 200
bytes per frame (10,000 bytes/s)/(50 frames/s). If TRT is
5 ms, the other alternative, the token rotates 200 times per
second (1/5 ms). The same 10,000 bytes are delivered in
50 bytes per frame (10,000 bytes/s)/(200 frames/s). Therefore:

It is possible, though highly improbable, that each station in
an overloaded ring could use the token for TNEG time (minus ring latency) when the token is captured. This is a worst
case scenario. The maximum usable_token latency would
then be (n - 1) (TNEG) + 2 (Ring Latency). For this improbable event to occur each station on the ring must transmit for the maximum allowable time-in this case TNEG minus ring latency.

5 ms Case:
28 bytes overhead + 50 bytes data = 78 bytes/
frame - 36% overhead
78 bytes/frame • 200 frames = 15,600 total bytes
(10,000 bytes data)

In the above configuration, the maximum usable_token latency is 3 seconds at 20 ms TNEG, and 0.75 seconds at
5 msTNEG.

4 Actual time Is Target Token Rotation TIme (TTRT) less the sum of maxi·
mum Ring Latency (D_MAX = 1.617 ms), maximum Frame Time (F-MAX
= 0.361 ms), and Token TIme (0.00088 ms).

4-61

»
z

•
.....
N
OC)

(n - 1) (TNEG)
Latency

+

frames were transmitted on the last rotation. In the large
150 station ring described earlier, a 1 kByte frame would
represent 50% network load to the MAC timers. A longer
latency would require a larger frame to get the same 50%
load factor. The latency timing feature of the BMAC device
allows determination of the appropriate threshold for a load
factor. (See Network Monitoring, Section 5, for an example
load factor calculation).
The threshold may also be viewed as a reservation of time
for transmission of frames at higher priority. In this case the
thresholds can be set directly from the tables contained in
the BMAC device datasheet (end of Section 5).

2 (Ring Latency) = Max. Usable Token
(2)

Therefore: (150 - 1) • 20 ms + 2(150 ,..s) = 3.0s
and:
(150 - 1) • 5 ms + 2(150 ,..s) = 0.75s
This kind of tradeoff can best be made by a network management station as described later, since a station that attemps to minimize the usable_token latency can adversely
effect network throughput in some configurations. For example, if the Ring_latency were 1· ms, instead of the
150 ,..S above, the change in TNEG from 20 ms to 5 ms
would change the maximum throughput from 95% to 85%.
TABLE III. Example Configurations and TNEG Value
Stations

TNEG

Maximum
Throughput

Maximum
Usabl&-Token
Latency

10

8
64
167

0.9986
0.9998
0.9999

0.072ms
0.576ms
1.503 s

150

8
64
167

0.9811
0.9976
0.9991

1.192s
9.536s
24.883 s

500

8
64
167

0.9374
0.9922
0.9970

3.993 s
31.937s
83.334s

2.4 Selection of TMAX and TVX
Stations should only change the TVX and TMAX values
when there are critical responsiveness requirements. No improvement in throughput will be achieved, and in most rings,
no improvement in network availability will be achieved.
However, a discussion of their selection. criteria is provided
her as guidance for tuning these parameters to the latency
of the network.
2.4.1 Selection of TMAX
The BMAC device has been designed so that it can be applied to rings with extremely large latencies. In these cases,
the value of TMAX will need to be longer than the default.
Making TMAX shorter has a statistically insignificant impact
on ring availability, therefore, most implementors need only
use the default specified in the FOOl Standard. The BMAC
device sets TMAX to default on reset. Special closed systems may benefit from a shorter TMAX value, since a very
small set of ring failures is detected by timing for TMAX. In
either the longer or shorter TMAX case, the BMAC device
can be loaded with the desired value after reset. S

Note: At 1 f's per stetlon latency (Including optical fiber propagation delay).
actual latency may be different.
.

Note that a TNEG (TREQ) of 8 ms can significantly reduce
the usable_token latency (a good thing) and still not decrease throughput significantly for rings of under about 150
stations.
A· robust method of contrOlling the TNEG of a ring can be
created using the operational characteristics described
above, and the management features of the BMAC device.
Normal stations operate with the default TMAX (approximately 167 ms) and TREQ equal to the TMAX. A network
management station determines the desired TNEG for the
ring based on knowledge of synchronous applications requirements and ring throughput implications. The network
management station sets its TREQ to the desired TNEG
value, thus determining the TNEG resulting from the Claim
Process. See Table III.
If implementors allow stations to set TREQ independently,
then it is advisable that a lower bound on TREQ be enforced to protect the network from serious denial of service
problems. When TREQ is changed, the station can cause a
Claim Process by setting the ClM bit of the Function Register (FR) in the BMAC device. If this is not done, then it may
be a long time before the desired change in TNEG would
occur.

2.4.2 Selection of TVX
The Valid Transmission Time (TVX) register is used to hold
the FOOl parameter TVX....valid. The token is assumed to
be lost if the time between receiving valid frames or non-restricted tokens is longer than TVX. The BMAC device loads
TVX with the default value recommended in the FOOl MAC
Standard upon reset. TVX need only be changed in rings
with latencies larger than 1.7 ms. If a station has a TVX
value that is too small, the likely symptom will be a ring that
oscillates between the Claim Process and being operational. The optional SMT Parameter Management Frame (PMF)
capability can be used by a network manager to attempt to
fix an oscillation condition. The National FOOl chip set has
been deSigned with larger than default counters to allow
large latency networks, other implementations may not be
able to interoperate in one of these very large networks.
In stations which need a non-default TVX value, station implementors can provide a non-volatile storage location. This
feature would avoid potential oscillation between the ring
being operational and being in the Claim Process, when stations are powered off and on in a larger network than supported by the default value.

2.3 Selection of Asynchronous Priority Thresholds
Asynchronous priorities are set in the THSH1, THSH2, and
THSH3 Registers. These priorities are of greatest value
when the ring latency is large. Two approaches can be used
for setting the thresholds. The first sets the threshold at a
load factor, for example 50% load. In the majority of systems, the latency will be small enough that all load factors
default to the same effective leilel, namely transmit if no

2.5 Adjustment of Value for Parameter Encoding
Two representations are used for timer values in the BMAC
device. Where accuracy and resolution are important, the
chip uses binary encoding. Where network manageability
5 See the FOOl Standard for the calculation of these values. The value of
OMAX should be computed from the equations In the PHY Stendard. TVX
and TMAX equations are given in the MAC Stendard.

4-62

the ring being non-operational, and other times the ring may
be OSCillating between operational and non-operational
states. The BMAC device is designed to support network
management applications that correct or isolate these rare
faults. Described below are several methods which facilitate
fault isolation.

would not be compromised, an exponential representation
was used. Tables for converting exponential values are included in the BMAC device datasheet. This optimization
saved circuitry which allowed other functions to be included
in the BMAC device. When desired values cannot be represented exactly in the chip, the guidelines shown in Table IV
can be used.

3.1 How to Perform Transmit Immediate
Transmit Immediate is a BMAC device feature which allows
the transmission of any frame without the ring becoming
operational. In other words, no token needs to be received,
the station just strips anything received and transmits its
frame-thus: Transmit Immediate.
The transmit immediate capability can be used to isolate
many faults. One tool that is useful is to allow a network
manager to segment the ring. USing this capability, faults
can be localized by monitoring the symptom of the failure.
For example, if the ring cannot become operational, an application can segment the ring by forCing a configuration
change in a remote station(s). If the symptom goes away in
the segment containing the network management station,
the fault is probably in the isolated segment of the network,
if it doesn't, the fault is probably in the remaining segment of
the network. The same procedure can then be used with a
different remote station until the fault domain is located.

TABLE IV. BMAC Device
Parameter Encoding Guidelines
TREQ
TMAX

TVX
THSH

Loaded Time s: Desired Time
Loaded Time :2: Desired Time
Loaded Time :2: Desired Time
Loaded Time Is the Closest to Desired Time

2.6 Changing Addresses
The BMAC device has been designed to reduce the number
of things that an implementor needs to worry about. The
setting of the station addresses, unfortunately, is not one of
those things. Addresses can be changed by the SMT processor through the control interface, and here lies potential
danger. Dangers exist for both Group and Individual Addresses; but the more serious implications are in changing
an Individual Address. If an Individual Address is changed
while a frame is on the ring, or still enqueued, then a no
owner frame can be created, since the address is changed
one byte at a time (a no owner frame will eventually be
stripped when it runs into a station which is transmitting).
This can be avoided by waiting for the transmit queue to
become empty, then disable the Individual Address with the
BMAC Device Option Register, until the change is complete.
If the implementation uses the optional external Claim or
Beacon frames, the address must be changed in those
frames also.

In the case of timer parameter faults, the problem may be
corrected directly by performing a transmit immediate of an
SMT PMF Request Frame to the station with the invalid
parameter.
Applications using the transmit immediate capability must
take into account three important items. Differing implementations of transmit immediate, transmission of MAC frames,
and the effect of the Ring being Operational.
The BMAC device has the capability to perform transmit
immediate under all ring conditions; other implementations
do not. Therefore, the application cannot expect a response
from other stations.
The fault isolation protocol must take into account that in a
ring stuck at the Beacon Process, each repeating station
will enter Claim every TMAX, destroying traffic being repeated at that time. As a result, the source or destination of the
frame, or any station between may make the transition to
Claim, causing an abort of the management frame. The
probability of getting a frame to the destination is improved
with a few techniques. Setting the Inhibit Recovery Required
option (lRR bit in the BMAC device Option Register) will
allow the station to transmit complete frames independent
of the station's TRT expirations. Setting the IRPT option will
stop MAC frames generated by other stations from aborting
transmission. A short frame has a statistically smaller
chance of being aborted by other stations; but retry of the
frame may also be necessary.

The BMAC device also includes an on-chip SMT group address recognition capability. The SMT committee has request addresses for use in SMT frame protocols. These reserved addresses are for the exclusive use of SMT processes. Changes to the base group addresses may result in
frames being copied as the result of comparison against a
partially changed address. If the group address capability is
used for SMT addresses, individual addresses can be enabled and disabled without this problem.
2.7 Denial of Service Protection
Some of the discussion on individual parameters indicated
how the ring can become unusable with the improper setting of that parameter. Improper use of parameters or
frames can result in disruption of service to the entire ring,
or in some cases, to a single station. These conditions can
be grouped together as denial of service problems. In general, it is prudent that an implementor only allow operational
changes by trusted software. This includes the setting of
parameters, as well as the ability to source MAC frames
(e.g., Claims and Beacons) and SMT frames. This is simplified by features in the BMAC device like internal Claim and
Beacon generation, transmission of Source Address from
the Parameter RAM, and reset to default values of important parameters.

3.2 Implementing SMT Events
The BMAC device and PLAYER device are deSigned to allow for reporting of significant network events. This includes
timer expirations, received frame conditions, and counter increments and overflows. All 0.1 these conditions are implemented as maskable interrupts. Use of these interrupt conditions can eliminate any need for pOlling of status in the
FOOl logic. SMT frames are transmitted as the result of
some of these events. The ability for generation of interrupts on increment of a BMAC device statistical counter
(e.g., Error Counter) allows for generation of event report
frames directly from BMAC device interrupts.

3.0 USE OF THE BMAC DEVICE
FOR FAULT ISOLATION
In some failure cases, communication on an FOOl ring will
be impossible because of a low probability failure within
some station on the network. Sometimes, this may result in

4-63

=r-------------------------------------------------------------~

.

~

~

4.0 USE OF THE PLAYER DEVICE
FOR CONNECTION MANAGEMENT
The interface between the PLAYER device and the FOOl
connection management (CMD protocol is designed so that
time critical operations are performed by the PLAYER device. The most time critical operation to be performed by the
CMT software is PC_React. PC_React is equal to 3 ms
and is defined by the standard as the maximum time for the
Physical Connection Management (PCM) state machine
(implemented by a combination of hardware and software)
to make a transition from the active state to the break state
in response to the Quiet Line state (QLS), a fault condition,
or a request to start the PCM protocol (PC_Start).

LOAD

TRT
I

I

ROTATION TIME

Important fault isolation features are provided in the Connection Management (CMD protocols specified in the SMT
standard. The PLAYER 'device includes counter and interrupt logic to aid in implementing these protocols. The line
state reporting of the PLAYER device includes individual
reporting of each state transitioned, thus providing a history
of all line states seen since the register was cleared. (Registers: Receive Condition A and B (RCRA, RCRB». This is
important since the Physical Connection Management
(PCM) is intended to run, even when the optical link has an
extremely high error rate. The line state history thus provides greater flexibility to the software implementing these
protocols. In addition, individual masking of line state interrupts can eliminate interrupts for line states that are ignored
in a specified operational state.

TUF/11084-1

FIGURE 2. Timed Token Protocol
If the Token Rotation Time is equal to TNEG, then the network is at the maximum utilization. In a similar way, a T-pri
value can be determined for loading into a THSH register by
picking the desired load factor and determining the corresponding time value. Conversely, a time value can be
picked to determine the maximum utilization at that T_pri.

LOAD

Another fault isolation capability supported directly by the
PLAYER device is the noise timer, which detects jabber
conditions (continuous transmission) and other faults that
may occur in a system. This timer is referred to as the TNE
timer in the standard. The PLAYER device has prescale and
count registers which load countdown counters. Each Noise
Line State, Active Line State or Line State Unknown symbol
will decrement the noise counter. The noise counter is used
by the Physical Connection Management (PCM) state machine to detect the length of the noise events.
When the TNE timer threshold is exceeded, an interrupt can
be generated by the PLAYER device which causes the PCM
state machine to transition from the active to the break
state. The PLAYER device also includes hardware that implements the Link Error detector function of SMT. The
LETR and CLECR registers are also used for performing the
Link Confidence Test during link establishment.
5.0 NETWORK MONITORING
Maximum network throughput can be calculated as:
n(TTRT - Ring Latency)/(n(TTRT) + Ring Latency)

I

I
I

Lprl
I
I
I
I

L e9
I
I

ROTATION TIME
TL/F/11084-2

FIGURE 3. Asynchronous Priorities
The same basic equation (Eqn. 3) is used to monitor the
throughput of the network. Either monitoring the throughput
or setting timer parameters requires determination of the
rhig latency. The BMAC device includes hardware that performs a latency measurement of the ring. The latency of a
ring will vary slightly through expansion and contraction of
the elasticity buffers and smoothers required in PHY components like the PLAYER device, and more significantly
through stations entering and exiting the network. Therefore
periodic measurement may be necessary for network monitoring. The latency measurement, obtained through the
RLCT counter in the BMAC device, can be used in conjunction with the token counter (TKCT) to determine average
load over time. Average load is then represented by the
equation.
(Time - (Token_Ct· Ring Latency»/Time
(4)

(1)
Again

Where n is the number of stations in the network.
This basic equation can be used to determine the proper
values for TREQ. This function determines the asymptote
for network throughput. The actual utilization of the network
can be calculated as:
(3)
(TRT - Ring Latency)/TRT

For example:
(5 sec - (5000 Tokens· 150 ,",s»/5 sec = 85% Utilization

Where TRT is the actual token rotation time.
This function produces the curve shown in Rgure 2.

4-64

r-------------------------------------------------------------------~~

REFERENCES

Over a measurement period of 5 seconds, 5000 tokens
were counted in TKCT and the ring latency counter read
150 '""S. Working the formula through results in an 85% load
on the ring.
The BMAC and PLAYER devices also include required and
optional statistical counters that can be used to evaluate
traffic in terms of frames. One of the important counters
added is the Frame Not Copied (FNCT) count of the BMAC
device. This counter is very useful for evaluation of overload
on stations in a network, since it indicates inability of the
station to keep up with frames sent to it. Network managers
need this type of information for proper administration of
server stations. The BMAC device transmit and receive
frame counters (FTCT and FRCT) provide valuable traffic
information with virtually no software overhead. The error
counters in the BMAC and PLAYER devices are useful indications of error rate problems on communication links in the
ring. All of these counters are designed to simplify the implementation of station software.

1. National Chip Specifications.
2. Fiber Distributed Data Interface (FDDI)-Token Ring Media Access Control (MAC), ANSI XS.139-1987.
3. Fiber Distributed Data Interface (FDDI)-Token Ring
Physical Layer Protocol (pHy), ANSI XS.148-1988.

Z

..:..
N
C»

4. Fiber Distributed Data Interface (FDDI)-Token Ring
Physical Layer Medium Dependent (PM D), ANSI
X3.166-1990.
5. Fiber Distrubuted Data Interface (FDDI)-Station Management (SMT), X3T9.5/84-49, Rev. 6.2.
6. R. Jain, Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting
nRT, DEC-TR-655, September 1989.

III
4-65

Interfacing the HPC46064
to the OP83200 FOOl
Chip Set

National Semiconductor
Application Note 736
Simon Stanley

TABLE OF CONTENTS

2.0 FDDIINTELLIGENT STATION ARCHITECTURE
In FOOl, the Station Management (SMT) service is split into
three main sections, SMT Frame Services, Ring Management (RMn and Connection Management (CMT). Within
the National Semiconductor implementation of FOOl, any
controller handling RMT and CMT services need only access the Control Bus directly, although a communications
channel to the host is also required. An architecture using
the HPC from National Semiconductor is shown in Figure 1.
This can be implemented directly using the interface shown
in Figure 2. Using this architecture, the SMT frame services
are provided by the host.

1.0 INTRODUCTION
2.0 FDDIINTELLIGENT STATION ARCHITECTURE
3.0 DP83200 FDDI CHIPSET
4.0 HPC46064 HIGH PERFORMANCE
MICROCONTROLLER (HPCTM)
5.0 CONTROL BUS INTERFACE

1.0 INTRODUCTION
Fiber Oistributed Oata Interface (FOOl) is a high bandwidth
(100 Mbits per second) local area network (LAN) which
uses a dual redundant ring architecture. The network consists of a number of pOint to point links connected to form a
. ring. The physical and electrical characteristics of the ring
protocol are covered by the Physical Media Dependent
(PM D), Physical (PHy) and Media Access Control (MAC)
Standards as defined by the American National Standards
Institute (ANSI) X3T9.5 committee, and can be implemented
using the OP83200 FOOl chipset from National Semiconductor. The on-line verification of these point to point links,
and the formation of a ring is covered by the FOOl Station
Management (SMn Standard.
This application note covers the use of the HPC46064 High
Performance Microcontroller from National Semiconductor
to provide the local processing power required within a Fiber
Distributed Oata Interface (FOOl) node for Station Management (SMn. The note covers the interface between the
HPC and the FOOl chipset from National Semiconductor
and a possible system architecture.

The architecture shown is one of several that could be implemented with the HPC and the National FOOl chipset.
This architecture connects the HPC multiplexed address/
data bus to the control bus of the FOOl devices, allowing
the HPC to access these devices directly with single instructions. The 16 Kbyte ROM of the HPC46064 is used to minimize chip count, though this architecture allows external
ROM or RAM to be used if additional functions are implemented.
The HPC has sufficient performance to handle all of SMT,
including frame based management, but this would require
that the HPC have access to the frame buffer memory. This
requires an arbitration scheme to resolve conflicts between
the host and the HPC in accessing the buffer RAM. The
arbitration scheme could be simply implemented using the
HOLD and HLOA (Hold Acknowledge) pins of the HPC.
An advantage of putting all of SMT on the board is that the
SMT function need not be resident in the host memory. The
removal of TSRs or daemons from host memory leaves
more room for applications.
An alternative architecture would run the HPC in single chip
mode, reducing the chip count and allowing the Universal
Peripheral Interface (UPI) port to be used as the host interface. This would require software drivers to simulate the
FOOl control bus signals using the 1/0 ports of the HPC.

4-66

INTERRUPT
TO HOST

INTERRUPT
FROM HOST

HOST SYSTEM BUS

Station Management (SMT) Task Allocation
SMT Frame Services

HOST

Ring Management (RMT)

HPC

Connection Management (CMT)

HPC

To Fiber Optic
Transceiver
TUF/lll03-1

FIGURE 1. FDDI Station Architecture Using HPC for Partial Station Management

•
4-67

AN·736

;. .

Vee vee

Q"

_

="

-

I r ~~"L
po~
,,~
~Tl- + ~ ~

01

>02

II
1
I L-

NC

-¥- 10
......-,6'-11I

"",-

.... •

"..------

S

13

-'_"

17
'

(_
13
DO
I;-11-"
,
,
"
L-- -,,-"

B4

67

.r,r-,. 1M...
L!L
",,BID
'-ll

~

'" ...

_

., -"-

., "-

..a~" ."'~"
""",--, J tH'
i:: · .. "
f_
r_
'_

:jt
04
1t
06
,,"

B14 -".,

~~~"" ~~
,,>L

~ ~ '~":ii:
!Ii.m~-,
H!!'~ ~
_

_ '" -<- I '1i.m
:;;:

m

00

OST INO

,
.m ,.
HOST INI

HOST IN"

@ST IN.

",mI.
"", ..,

_

....,_
CK2

f

T~

~:01

_
; OJ

~"
~IS

-t-f16
."
"
' "'

.
,....
r_
i25
!;--,F
r_
"iF,_..-

101."

~

":: ~..•
""' :....

~

.. " I
101.. "-l1
,
'
,.:g
1013

I

l

11

I

l

-

,-

CBA'

4~r-~ t::~_

0-

B7

r_

,-

'Lc.!E-

-

I

.!!L
D1

~"

----..14 ..
04

L-

17

-'-'

D.

Itfl
" •OC

I"I!V

I.

""'"-(

ACK

BSI

9.

i
.rrCBAI

,r
.r =CBA3
-

f._ m
101

;-- -

,_

.- -

,-

'I_!.......,

".

7

•

C'P

I

I

hi

c

--;;J,

C'DO
C'D2
C'03

6

-h

..
.. '•

I

•
j;;;;;;

I

" '
,,'
A7 •

701

CBDO
CBDI

106

CSD3

m
10.
m

-CBD6

110

CBP

I

-

cr

-,,-

2

102

I

oJ

-'--'
._1 I

DO

III

"..

t
m.-~.~
TLl
~,
~
.. ·
~
~
L---..-. .
~~~~ I~ ~ ~LAY£R 1
Vee

•• "

,-,

---'

1-

C'A3

!!fW

L

~

C'AI

~
•
..
•
~
~ol!J
I ~.
~m~ ~I
lli~7
cP
u.
1--1~ ~:~!
~ . ."-~
..

I

.. '"

m~I~~ ~~

:...-

•• fl!-

=

r
I.!!..
ID-PS-3-26-'--

~~
~" •

I

~

123

"'

I

.. "

r-

" , - "

AID

37

2

~

, . INT
'
titr<

I-

W.

11

..

" "
....

AI3

I

3

".

06

_

-_
-1..A

rc
_.:
-

.Iit:::
.. "

...
ilii~~~f======"""'~~~~~~~~~~L.!!W
...,!!!!.STOU'
_ OU7
=-t
Q!S m - .

~'M

II

-

~
~~ ~" ~ ..A12~

HOSTOU2
\..
HOST OU4)....

1

ru;-1-

."'-

m

1'-1-~
_

~

i.L

BI.L
B2

.:!:"
-'!- "

£

BO

_
-

P31-lL

,-,<

r Trlr~===~===;
I
"--1,11
I-~I
::: r·~'
'i"~--,
l

!

.,

124

jj

-ACK

-..-

r.-

-m-

0:IJt. ~
c--msk-----r.
~t' ---~ ••,~f.-'.:~
,-o/tt.

",,0
12

--'l

74ALS373 - '

C'A2

~ ,~-

'

130

C'DO
CBD3
CBD4
CBDS

~ ~:~~
~

_ _-,.!2......u CBP

TUF/lll03-2

FIGURE 2. HPC to FOOl Chipset Interface

3.0 DP83200 FDDI CHIPSET
The DPB3200 FDDI chipset from National Semiconductor
implements the PHY and MAC Standards as defined by the
American National Standards Institute (ANSI) X3T9.5 com·
mittee. The chipset includes the following devices.

The HPC46064 features include 16 bit internal architecture,
16- or B-bit external data bus, 16 bit address and up to 52
general purpose I/O lines. The HPC46064 also includes a
full duplex UART, four 16-bit timers, 16 Kby1es of ROM and
512 by1es of RAM.
The HPC46064 is used in this design because its 16 Kbytes
of on-Chip ROM remove the need for an external EPROM.
For prototyping or small production runs the pin compatible
HPC467064 may be used, which has 16 Kbytes of on-Chip
EPROM.
Devices in the HPC family can directly address 64 Kbytes of
external memory. This address range can be expanded to
over 500 Kbytes without additional devices by using I/O
pins to implement a simple bank switching technique.
This additional addressing range may be needed if the HPC
implements the whole SMT function. The HPC development
tools support this bank switching technique, allowing this
low-cost microcontroller to handle the whole SMT function
while minimizing the software development effort.
The performance of the system will not be affected by using
this bank switching approach because many of the SMT
functions are never performed simultaneously. The HPC
could, for example, run the Physical Connection Management (PCM) from one memory bank, then switch to the bank
containing the frame-based management functions at its leisure.

DP83231 Clock Recovery Device (CRDTM DEVICE)
The Clock Recovery Device extracts a 125 MHz clock from
the incoming data of the upstream station. Its features in·
clude on-chip loop back control, on-chip PLL, ability to lock
to a Master Line State in less than 100 p's, and a Single
+5V supply.
DP83241 Clock Distribution Device (CDDTM DEVICE)
From a 12.5 MHz reference. the CDD generates the
125 MHz, 25 MHz and 12.5 MHz clocks required by the
PLAYERTM and BMACTM devices.
DP83251/DP83255 Physical Layer Controller
(PLAYERTM DEVICE)
The PLAYER device converts the BMAC 12.5 Mby1e/s
stream into a 125 Mbaud 4B/5B encoded bit stream as
specified in the FDDI PHY Standard. It synchronizes the
received bit stream to the local 12.5 MHz clock and decodes the 4B/5B data into internal code. The DPB3255
PLAYER device also contains a configuration switch for use
in dual attachment stations and concentrators.
DP83261 Basic Media Access Controller (BMACTM
DEVICE)
The BMAC implements the functions defined by ANSI
X3T9.5 FDDI Media Access Control Standard. The BMAC
consists of the transmit and receive state machines, an address magnitude compare unit, a CRC checker, a CRC generator, protocol timers and diagnostic counters.

5.0 CONTROL BUS INTERFACE
The FDDI chipset from National Semiconductor provides
the PHY and MAC services as detailed in the FDDI Standard. The chipset does not provide the Station Management
(SMT) services, but does provide access to all the necessary data through a large array of B-bit registers located onboard the PLAYER, BMAC, and BSI devices. The interface
to these registers is via the Control Bus defined in the data
sheet for the BMAC Device (Media Access Controller). The
interface consists of an B-bit address bus, B-bit data bus
and several control lines. The control lines consist of a read/write Signal, a chip enable signal and an acknowledge
signal. There is also an interrupt signal and a parity bit,
which for this application, has been disabled. The interrupt
signal and the acknowledge Signal are open drain signals
and can be wire-ORed.

DP83265 BMAC System Interface (BSITM DEVICE)
The BSI device provides a multiframe, multiple channel interface between the BMAC device and a host system. The
BSI device interfaces directly to the system bus or through
low-cost DRAMs. The efficient data structures employed
provide high throughput with minimal host intervention.
For more information on these and other devices in the
chipset please consult the appropriate data sheets and application notes.

A transfer cycle on the bus is started when the processor
drives the Chip Enable (CE) signal low. Within 20 ns, the
data (write cycle only), address and read/write signals must
all be valid. The device being accessed will respond by driving the Acknowledge (ACK) Signal low when data is valid
(read cycle) or when the data has been clocked in (write
cycle). The processor can now end the transfer by driving
CE high and the device will complete the cycle by driving
ACK TRI-STATE®.

4.0 HPC46064 High Performance Microcontroller
(HPC DEVICE)
The HPC46064 is a member of the HPC family of High Performance Microcontrollers. Each member of the family has
the same core CPU with a unique memory and I/O configuration to suit specific applications. The HPC46064 has
16 Kby1es of on-chip ROM and is fabricated in National's
microCMOS technology. This process combined with the
advanced architecture provides fast, flexible I/O, efficient
data manipulation, and high speed computation.

4-69

U)

~

z•

c(

r---------------------------------------------------------------------------------,
No pOlling of the Control Bus is required as the interrupt
signals for each device are brought into the HPC separately.
A simple host interface is provided consisting of two interrupt signals and two eight bit ports, one for read and one for
write.
Device U1 is a GAL16V8 (a programmable logic device) and
performs all of the logic functions required to generate the
control signals used by this system. The programming of
this device using the ABEL language is straightforward, as
shown by Figure 5.

The HPC provides a multiplexed 16 bit bus for interfacing to
external memory. As only 8 bits are required for the Control
Bus, the interface can be achieved with minimal components (see Figure 2). The multiplexed address is latched by
the flow-through latch, US. The data bus is buffered by the
bi-directional buffer, U2, which is enabled whenever either
read or write signals is asserted by the HPC. The direction is
controlled by the Write (WR) signal. Two chip enables are
provided (PCE and BCE) by decoding the read, write and
upper address bits. The chip enables are delayed until the
next Clock (CK2) falling edge so that during a write cycle,
the data is available within 20 ns of the chip enable. The
Ready (ROY) signal forces the HPC to insert wait states
until an ji£j( is received from the Control Bus. (See Figures
3 and 4 for interface waveforms.)

TA
CKI
CK2
ALE
AD-IS
iW

WR

~~~~;(~:::==========C=ON=TR=O=L=BU=S=A=OO=R=ES=S~VA=l1=D==~~~~~~~~~~~}-~
CONTROL BUS DATA VALID
}--

CBA(0-7)
CBD (0 -7) :

~

\~--------~--------------------------~I
FIGURE 3. Control Bus Interface READ Cycle

4-70

TLlF/lll03-3

TA

TW

CK1

CK2

ALE

AO-15

iW
ViR
iffiY

CE
ACK

CBA(0-7)

CONTROL BUS ADDRESS VALID

CBD(0-7)

CONTROL BUS DATA VALID

BOE

\

/
TLlF/11103-4

FIGURE 4. Control Bus Interface WRITE Cycle

Title 'HPC to C Bus Interface
Simon Stanley
National Semiconductor 12 Dec. 1990
UOl
device 'GAL16V8';
CK2,WR,RD,ACK
pin 2,3,4,8;
A15,A14,A13
pin 5,6,7;
RDY,NCK2,PCE,BCE, BSICE, BOE
pin 18,19,16,17,14,15;
Address = [A15,A14,A13,x,x,x,x,x,x,x,x,x,x,x,x,xl;
equations
!PCE := (!RD# !WR) II: (Address >= h8000) II: (Address <= h9FFF) ;
!BCE := (!RD# !WR) II: (Address >= hAOOO) II: (Address <= hBFFF) ;
RDY = (WR II: RD)# !ACK;
!BOE = !WR# !RD;
NCK2 = !CK2;
FIGURE 5. ABEL Source File for HPC FDDllnterface PAL

4-71

BMACTM Device Software
Design Guide

National Semiconductor
Application Note 678
David Brief

Table of Contents

1.0 INTRODUCTION
This application note describes how to initialize the BMAC
device and what to do while it is inserted in a ring. The
software support to implement the Media Access Control
(MAC) level protocol and the necessary services to a Sta·
tion Management (SMn entity in an FDDI node are de·
scribed. The necessary data service support for transmitting
and copying frames is not covered in this application note.
The MAC protocol and all of the services required by SMT
(except the SMT data services) are supported through the
BMAC device's Control Interface. The processor running
this software must have access to the Control Bus and have
the ability to respond to interrupts.

1.0 INTRODUCTION
2.0 CONTROL SERVICES
3.0 INITIALIZATION PROCEDURE
3.1 Put the BMAC Device in Stop Mode
3.2 Load the MAC Parameter RAM
3.3 Clear the MAC Event Counters
3.4 Clear the Event and Mask Registers-Optional
3.5 Modify the Timer Thresholds-Optional
3.6 Set the Option Register

2.0 CONTROL SERVICES
The Control Services provided by the BMAC device are accessed through the Control Interface. A more detailed de·
scription of the facilities and services provided by the BMAC
device is given in the BMAC device datasheet.

3.7 Set the Mode Register
3.B Loopback Testing-Optional
4.0 DURING OPERATION

The BMAC Control Bus address space is divided into 4 ad·
dress ranges:
The Operation registers control the current mode of opera·
tion of the BMAC device (Run/Stop, Internal Loopback) in·
cluding the options that are being used (Short/Long Addressing, MAC state machine options). In addition several
functions may be initiated (Master Reset, MAC Reset,
Claim, Beacon).
The Event registers record the occurrence of events which
may cause interrupts (each event bit has a corresponding
mask bit). These include Ring, Token and Counter Incre·
ment/Overflow Events.

4.1 Control Interface Event Registers
4.2 Event Control
4.3 Servicing Interrupts
4.4 Event Counters
5.0 EXAMPLE PROCEDURES
5.1 Getting the Ring Operational
5.2 Receiving and Copying a Frame
5.3 Initiating Claim
6.0 DIAGNOSTIC SCENARIOS

The MAC Parameter RAM contains all of the MAC related
parameters such as this station's long and short addresses.
The MAC Counter/Timer Thresholds contain the event
counters (Frame, Error, Lost, Copied, Not Copied, Transmit·
ted, Token) in addition to the programmed thresholds for
the various MAC timers such as TMAX and TVX.

6.1 For (At Least) One Station
6.2 For Two or More Stations
6.3 Path Tests

The various ranges may be accessed for reading and/or
writing either always or only in stop mode as shown below.

Address Range

Description

00-07
OB-2F
40-7F
SO-BF

Operation Registers
Event Registers
MAC Parameter RAM
MAC Counters/Thresholds

ReadCond
always2
always2
stopl,3
always

WriteCond
always2
always (Cond)2
stop1,3
stop1

Nota 1: An attempt to access a currently inaccessible location because of the current mode or because it is a reserved address
space will cause a command error (ESR.CCE set to One).
Nota 2: Read and write accesses to reserved locations within the Operation, Event Address ranges cause a command error
(ESR.CCE set to One).
Note 3: The MAC Parameter RAM is also accessible when:
a) the MAC Transmitter Is In states TO, Tt or T3;
b) Option.ITC and Optlon.lRR are set
c) Function.ClM and Function.BCN are not set otherwise accesses will cause a command error (ESR.CCE set to One).
Nota 4: Reserved bits In registers are always read as 0 and are not writable.

4-72

Determining TREQ
TREQ is this MAC's requested value for the token rotation
time, I.e., in the worst case, this station wants to "see" a
token at least once every 2"TREQ. For example if a station
wanted to be guaranteed to capture a token every 2 ms it
would set TREQ to 1 ms.
1 ms is 12,500 ticks of the 80 ns clock or 3004 hex. Subtracting this from 1-0000-0000 yields. FF-FF-CF-2B for
TREQ since TRT is an unsigned twos complement up counter.
Since the least significant byte of TREQ is transmitted as 0,
the value should be rounded up in order to guarantee that
this station will see the token as often as it needs to. In this
case TREQ would be written to FF FF 00 00.

3.0 INITIALIZATION
Before being inserted into a ring, the BMAC device must be
initialized. To initialize the BMAC device the following steps
should be followed. Each action is explained further below.
Put the BMAC device in Stop Mode
Load the MAC Parameter RAM
Individual Addresses (MLA, MSA)
Group Addresses (GLA, GSA, MAP, SGM)
Requested Token Rotation Time-TREQ
Beacon Information-TBT
Clear the MAC Event Counters
Clear the Event and Mask Registers-Optional
Modify the Timer Thresholds-Optional
TVX
TMAX
Asynchronous Priority
Set the Option Register
Set the Mode Register
Loopback Testing-Optional

Beacon Informatlon-TBT
TBT(31 :0) should be loaded with 00 00 00 00.
This is only modified in the case of specialized Beacon
Frames. Additional Beacon frames are being defined by the
FOOl standards committee.
The BMAC device has two limitations on the Beacon
Frames it can transmit. Firstly, only frames with a Null OA
with four bytes of information are transmitted by the BMAC
device. This precludes the use of the internally generated
Beacon Frames for the directed Beacon because it can not
be sent to the SMT multicast address. Secondly the size
restrictions on Beacon Frames also preclude their use for
conveying useful information. The Beacon Frame is the penultimate immediate transmission. (Blocking the MAC Indication Input with Option.IRPT will allow transmission of Beacon Frames in the presence of an upstream Beaconer.)

3.1 Put the BMAC Device in Stop Mode
The Mode Register is programmed first to place the BMAC
device into STOP mode so that all registers can be accessed.
The Parity for the different interfaces is enabled here as is
the ability to be in MAC Loopback. At Initialization it doesn't
matter if the part is configured in loopback, but since loopback testing will probably be done after initialization it could
be set now as well.
In a system without parity checking on the Control Bus or
the MAC Interface the Mode register would be set to 44h.
This enables the parity checking on the PHY interface which
is actually part of the Ring. (Parity is always generated by
the BMAC device to the PLAYERTM device.)

3.3 Clear the MAC Event Counters
The counters are 20-blt counters, but SMT requires 32-blt
counters. This implies that the upper 12 bits are maintained
by software.
In order to use the low order bits directly without having to
calculate how much they have changed since the last time
they were read, the counters should be cleared at initialization.

3.2 Load the MAC Parameter RAM
Load RAM with values as indicated in the following passages.
Individual Addresses (MLA, MSA)
MLA-the 48-bit address
MSA-the 16-bit address-Optional

3.4 Clear the Event and Mask Reglster&-Optlonal

Group Addresses (GLA, GSA, MAP, SGM)
The same MAP is used for the short and long group addresses. To disable Group Addressing, GLA and/or GSA
must be set to all ONE's.
Long Addresses-GLA plus MAP (Optional)
Short Addresses-GSA plus MAP (Optional)
Fixed Group Address-FGM(15:1) This is located at FF
(FF FF FF FF) Ox where the last nibble is fanned out
using the Fixed Group Map (SGM).
The Broadcast Address-FGM(O) must be set to One
in order to participate properly in the Next Station
Addressing protocols that rely on the Broadcast
Address.

The Event and Mask registers are actually cleared on a
Master Reset. If you did not do a Master Reset before the
initialization sequence it is good practice to clear these registers.
3.5 Modify the Timer Threshold&-Optlonal
At Master Reset the timer thresholds are set to the defaults
recommended by the standard. In most applications there is
little incentive to modify the defaults.
TVX
In most applications, the valid transmission timer, TVX,
would remain at its default value. The value of TVX determines in how long a valid transmission should be seen. If a
valid frame is not seen in this period of time the Claim process is started. This is one of the recovery required conditions.

Requested Token Rotation Time-TREQ
This should be loaded with FFOOOOOO unless this station is
using/managing Synchronous Bandwidth.
When this station is using Synchronous Bandwidth and
needs a faster average response time for its Synchronous
Bandwidth, the value of TREQ is used in the Claim process
to negotiate the target timer rotation time.
If this station wins the Claim process, every station will use
this station's value of TREQ as TNEG.

II
4-73

co

~
Z

Z
I

CJ)

......
co

Example Interrupt Service Routine
1. Disable Interrupts
2. Determine which event is triggering the interrupt
3. Determine which condition(s) exist that need(s) attention

After a conditional write register is read, if another conditional write register is read before a condition is cleared, the
compare register will no longer have the appropriate value
in it. In such cases the compare register should be written
with the previously read value of the register.

a. Read ICR
b. Read appropriate Condition Register
4. Process event
a. Complete Processing for the event or

The compare register may also be useful for software compare/update sequences and for diagnostic purposes.

b. Queue a process to handle the event
5. Clear or Mask the condition
a. To Clear:
i. Will only clear conditions that have not changed
since last read
ii. Make sure that last value read is in the Compare
Register
b. To Mask:
i. Clear the appropriate Mask Bit
ii. Before the Mask Bit is set to reenable interrupts, the
condition must be cleared as shown above.
6. Reenable interrupts
Additional Notes
1. Nesting of Interrupts:
Nesting of interrupts may be of use in driver level software.
For example if an error condition occurs while "processing"
a frame it may be prudent to stop processing the frame and
handle the error condition. Alternatively, once processing of
frames begins, it may not be necessary to reenable frame
related interrupts until all copied frames have been processed. This is especially true with token ring protocols where
bursts of frames between stations is common (or at least
should be common to optimize performance of the media
and the software. Software performance would be increased because the software performance can be related
closely to the number of interrupts that need to be processed).
2. Conditional Writes:
In the period between the Read of a condition latch register,
and the corresponding Write to reset the condition, additional events could occur. To prevent the overwriting and consequent missing of events, an interlock mechanism is used.
Whenever a condition latch register (RELRO, RELR1, TELR,
GILR, COLR, or ESLR) is Read, its contents are stored in
the Compare Register.
Each bit of the Compare Register is compared with the current contents of the register that is to be written. For any bit
that has not changed, the new value of the bit is written into
the register. For any bit that has changed the writing of the
bit is inhibited. This prevents the software from overwriting
bits which have changed since the last read and losing interrupt events. The fact that an attempt was made to modify
a changed bit in the register is latched in the Conditional
Write Inhibit bit of the Exceptional Status Register
(ESR.CWI). This bit is written unconditionally after each
write to a conditional write register. This is different than in
the PLAYER device.
The Compare Register may also be written unconditionally
by software. There is a single compare register for all of the
conditional write registers in the BMAC device. This is different than in the PLAYER device where each conditional write
register has its own compare register.

4.4 Event Counters
The event counters are 20-bit counters, but the SMT MIB
and SMT frames requires 32-bit counters. This implies that
the upper 12 bits are maintained by software.
The counters may be read either periodically or upon an
event. The fact that individual counters incremented or
overflowed is reported as an event in the GILR or GOLR
event registers respectively.
In order to use the low order bits directly without having to
calculate how much they have changed since the last time
they were read, the counters should be cleared at initialization.
Some uses of the counter may require that a consistent
value be obtained across two counters. Since the event that
a counter incremented is stored, software can tell if a consistent reading was obtained.
When reading individual counters, the upper 12 bits of the
counter are latched when the low order 8 bits are read. This
allows consistent readings of a single counter and implies
that the low order byte must be read first.
At least one of the event counters is incremented for every
Starting Delimiter (JK) received.
After a Starting Delimiter (JK) is detected:
If Token Ending Delimiter-Increment Token Count
(or) If Format Error-Increment Lost Count
(or] If Frame Ending Delimiter-Increment Frame Count
If Er = Rand FCS error detected-Increment Error Isolated Count
Else If AFLAG and VCOPY-Increment Frame Copied
Count
Else If AFLAG and not VCOPY-Increment Frame Not
Copied Count
5_0 EXAMPLE PROCEDURES
5_1 Getting the Ring Operational
To get the ring operational requires setting the Run bit in the
Mode Register to a ONE. Once TVX expires, the Claim process will be entered, and if a single token path exists, the
Claim process will quickly complete, a token will be issued
and the ring will become operational. This occurs even
when in internal loopback.
e.g.:
- Set Mode.Run = 1.
-

4-76

TVX will soon expire causing entrance to Claim.
Claim will resolve and a token will be issued.
The reception of a valid token causes the ring to become operational.
Once the ring is operational the station should check to
make sure that TNEG > T min to ensure that it can operate on the ring as an equal station (if this is not true it
may be denied service for excessively long periods of
time).

.---------------------------------------------------------------~~

5.2 Receiving and Copying a Frame
All frames are received by the BMAC device, but only
frames addressed to this station are copied. Every frame
received by this station causes the frame received counter
to be incremented. In addition for frames addressed to this
staion (when the A flag is set) either the frame copied
(FRCOP) or frame not copied (FRNCOP) bit is set and the
appropriate counter is incremented.
e.g.:
-

CILR.FRCOP is set indicating that a frame was copied
by external_logic

-

Can be used to wake up driver software

-

Software that receives this interrupt should
• Process the Frame Status
• Process some of the frame
• Pass remainder of frame to another process to be processed

5.3 Initiating Claim
- Enter stop mode (this breaks the ring)
Load a new value of TREO into the parameter RAM.
Load TNEG with TMAX.

-

Clear the events related to claim in RELRO and RELR1
Enter run mode.
Initiate the claim process by writing the Function Register with 14.
Wait until Function Register is zero.

-

Check that TNEG :<: TREO when claim completes.
See if this station won claim:

6.1 For (At Least) One Station

z

a,
.....
00

Control Interface Checkout
Internal Frame Generation Tests
State Machine Sequencing Tests
External Frame Transmissions
Test of Token Timers
Test of Transmission Options
Full Duplex Operation
6.2 For Two or More Stations
Beacon Scenarios
Claim Scenarios (Need Three To Do Complete Testing)
Duplicate Token Conditions
Duplicate Address Conditions
Abnormal Frame Termination (Format Errors. FCS Errors.
etc.)
6.3 Path Tests

-

-

6.0 DIAGNOSTIC SCENARIOS

A path test is performed to determine that everything is
working in that path. By doing successive path tests on
parts of the same path, the Fault Domain can more accurately be determined (i.e., which chip/connector is broken).
The fact that the chip set is full duplex greatly aids the path
tests. This allows identical tests to be run at all levels.
Paths that can be tested in a node:
Through the BMAC Device
Through All of the Station Paths
Through the CRD device for SAS and through Each CRD
device for DAS and Concentrators
Through Every Station on the (Logical) Ring

• See if RELR1.MYCLM is set
• If set see that TNEG = TREO.

II
4-77

BMACTM Device Hardware
Design Guide

National Semiconductor
Application Note 689
David Brief

Introduction

ring of stations. CLAIM, BEACON and Void frames are generated by the Ring Engine when appropriate. The Ring Engine transmits, strips or repeats Protocol Data Units (PDUs~
i.e., Tokens and Frames) and handles the token management functions required by the timed token protocol in accordance with the FDDI MAC standard.
On output (to the ring), interface logic prepares one or more
frames for transmission and requests a service opportunity.
Based on the requested service class and requested token
type, the Ring Engine waits for a token meeting the requested criteria. When a token is captured, the Ring Engine signals the interface and soon thereafter transmission begins.
After traversing the ring, frames are stripped based on the
Source Address. Frames with a Source Address matching
one of the station individual addresses are stripped by the
Ring Engine. Status is available at the MAC interface for
every transmitted frame.
On input, the Ring Engine sequences through the incoming
byte stream, comparing against the station short or long
addresses. The results of these comparisons are made
available at the MAC Interface. Interface logic then decides
how to handle the frame. In the normal case, a frame with a
Destination Address matching one of the station addresses
is copied and passed to the system.

The BMAC device provides the basic facilities required to
implement the Media Access Control functions required by
the ANSI X3T9.5 FDDI MAC standard. This document describes how to use the BMAC device to implement the MAC
level functionality required by stations in an FDDI network.
A short overview of the BMAC device is given followed by a
discussion of design considerations and tradeoffs for using
the BMAC device.
Familiarity with the ANSI standard and BMAC Device Datasheet is recommended before using this document.
The state machines and timing shown in this document provide illustrative examples only. Should there be a descrepancy, the BMAC Device Datasheet is the overriding authority.

Table of Contents
1.0 OVERVIEW
2.0 CONTROL INTERFACE
3.0 PHY INTERFACE
4.0 MAC INTERFACE
5.0 BRIDGING/EXTERNAL MATCHING SUPPORT

1.0 Overview
The BMAC device interfaces to one or more PLAYERTM
components, a Control Bus and to external logic that tunes
the MAC interface to the requirements of the system.
The BMAC device is comprised of the Ring Engine, the PHY
Interface, the Control Interface and the MAC Interface as
shown in Figure 1.
The BMAC device utilizes a full duplex, byte wide (symbol
pair) architecture. There are two bytes of delay in the transmit path, and three bytes of delay in the receive and repeat
paths. Two bytes of delay are present in the loopback path.
1.1 RING ENGINE
The Ring Engine implements the FDDI MAC protocol for
transmitting, receiving, repeating and stripping frames in a

1.2 CONTROL INTERFACE
The Control Interface implements the interface to the Control Bus by which to initialize, monitor and diagnose the operation of the BMAC device. The Control Interface of the
BMAC device is identical to the control interface of the
PLAYER device. Typically, all of the BMAC and PLAYER
devices within a station will all be addressable on a shared
Control Bus.
1.3 PHY INTERFACE
The PHY Interface provides a byte stream to the PLAYER
device (PHY Request) and receives a byte stream from the
PLAYER device (PHY Indication). The Configuration Switch
in the PLAYER device allows the BMAC device to be
switched into the Primary and Secondary rings as desired.

MAC Indication

PHY Indication

PHY Request

FIGURE 1. BMAC Device Block Diagram

4-78

TL/F/10825-15

1.4 MAC INTERFACE
The MAC Interface provides the interface to external buffering and control logic. A byte stream is provided to interface
logic with appropriate control signals (MAC Indication), and
a byte stream is provided to the BMAC device with appropriate handshake control signals (MAC Request).

ported in an Event Register). This means that all Control
Interface accesses complete in a deterministic amount of
time. This can be useful in the design of certain interfaces to
simplify synchronization circuitry. The Exceptional Status
Register must be checked to insure that the operation terminated normally.
The registers accessible through the Control Interface maintain the Operation, Event, Status and MAC Parameters.
The Operation Registers are used to control the operation
of the BMAC device. The Operation Registers include the
Mode, Option and Function Registers. The Mode Register
determines the current operational mode (run/stop, loopback, etc.). The Option Register determines how the BMAC
device will work while in run mode. The Function Register
initiates functions and provides polled status on their completion. These include a Software Master Reset, a MAC reset and the CLAIM and BEACON requests.
The Event Registers are used to report the occurrence of
events. The Event Registers are used to generate interrupts
when selected conditions occur (under program control).
The Status Registers are used to access either current
status or long term status from event counters.

It is the job of the external interface logic to transform the
byte streams to and from the BMAC device to implement
the data services required by the system interface.

2.0 Control Interface
The Control Interface provides an a-bit asynchronous interface to the Control Bus. Through the Control Interface, access is provided to all internal registers. These registers
control the operation of the BMAC device as described below. The interface to the Control Bus is identical to that of
the PLAYER device.
The Control Interface provides the synchronization between
the asynchronous Control Bus and the synchronous operation of the Ring Engine. The Ring Engine is a synchronous
device running exclusively on the 12.5 MHz Local Byte
Clock and the in phase 25 MHz Local Symbol Clock.
FDDI components within a station will typically share the
same Control Bus. The processor on this bus may be a
dedicated microcontroller that is running time critical portions of SMT (i.e., CMT), or it may be a more general purpose microprocessor which gets called on to handle interrupts.

The Parameter Registers are used to set up parameters
used by the Ring Engine such as the station's address and
the group address maps.

3.0 PHY Interface
The PHY Interface provides the data paths to connect the
BMAC device to one or more PHY Layer devices. The interface is synchronous; with every rising edge of the Local
Byte Clock ten bits are transferred in each direction-from
the BMAC device to the PLAYER device on the PHY Request Interface and from the PLAYER device to the BMAC
device on the PHY Indicate Interface. The elasticity buffer of
the PLAYER device removes the asynchronous element
from the data stream and allows the BMAC device to work
as a synchronous device with synchronous interfaces.
One BMAC device may drive one or more PLAYER devices
while only one PLAYER device should be driving the BMAC
device at any given time. TRI-STATE® control and pullups
are provided within the PLAYER device to allow several
PLAYER devices to share one PHY Indicate Bus. This is
very important in most Dual Attach and many Concentrator
configurations.

The Control Interface is separated completely from the
MAC Interface in order to allow the data paths to run at full
speed and not be shared with the slower control transfers.
Access to registers may occur simultaneously with the data
transfer.
All communication that is not synchronized with the (high
speed) data services uses the Control Interface. For example, error conditions are reported through the Control Interface, while frame reception status is reported at the MAC
interface synchronized with the data stream. Likewise, options for frame transmission that can change with every
frame are submitted to the interface with every frame.
All events are latched in condition latch registers, and may
generate interrupts. Only enabled events may generate interrupts. Events are reported through a two level logical hierarchy. Events are grouped into classes according to their
probable usage. Each event of a class may be enabled individually in the mask registers and event classes are enabled
via mask registers at the Interrupt Register.
Conditions are used to signify that an event or series of
events has occurred. The Interrupt signal becomes active to
notify the managing entity that a condition or set of conditions exist.
All of the events suggested by the MAC standard are reported by the BMAC device. In addition, the BMAC device provides events on each counter increment and overflow.
The Control Interface also manages access to shared registers. Certain Status and Parameter Registers are not accessible while in Run mode because the Ring Engine may be
accessing those locations. All Control Interface accesses
are checked against the current operational mode to determine if the register is currently accessible. If not currently
accessible, the Control Interface access is rejected (and re-

FDDI uses a 4B/5B symbol encoding scheme that is normally byte aligned. The PLAYER device aligns starting delimiters of all PDUs to the byte boundary. This allows the
BMAC device to detect the JK starting delimiter as a single
code point and greatly simplifies the alignment issues. The
BMAC device aligns delimiters of all transmitted or repeated
PDUs to the byte boundary.
The 10 bits transferred with each clock consist of B bits of
data and one bit of control to say if the data represents a
data code pOint or a control code pOint. Mixed data/control
symbol pairs are encoded to a set of control code pOints
with the data being given as zero regardless of the actual
data symbol value. Odd parity is also provided with every
byte.
Through parity is important in this path because every station's data goes through this path. Parity errors detected in
the MAC are treated as all other code violations (format
errors).

4-79

4.0 MAC Interface

INFORCVD when the fourth byte of the Info Field is on MID
until the next JK

4.1 OVERVIEW

Not all of the Signals would be used by a typical implementation. The sequencing signals are reset on a Master Reset.

The BMAC device is partitioned at the MAC Interfaces to
allow a full spectrum of system interface organizations. We
discovered early on that it would be difficult, if not impossible to develop an interface that met cost and performance
goals for all potential uses of FDDI. However, in crafting the
MAC Interface, we did not just guess what a good interface
would include. We modeled a complete System Interface
Architecture including a real time multi-tasking operating
system at the register transfer level on top of the MAC under the assumption that all lower performance interfaces
would be some subset of a very high performance interface
architecture.

One of these Termination Event Signals is asserted at the
end of every PDU as described below:
EDRCVD

when the Ending Delimiter of a frame is on MID
until the end of the Frame Status (typically asserted for two byte times)

TKRCVD

when the Ending Delimiter of a token is on MID
for one byte time

FRSTRP

when the first Idle byte of a stripped frame is on
MID

FOERROR when the byte with the format error is on MID

The MAC Interface provides independent Indication (receive) and Request (transmit) Interfaces. Separate signals
for control and data are presented at the interface to allow
overlapping/pipelining of data and control (status/ command) processing. A byte stream is transferred in each direction. On input, the MAC Indication Data byte stream
(MID(7:0» is handled by interface logic using the provided
sequencing and status signals. On output, the MAC Request Data byte stream (MRD(7:0» is generated by interface logic and passed through the BMAC device to the ring
on a service opportunity.

MACRST

The Flags provide the input for potential copy criteria and
status breakpoints as follows:

The interface is synchronous using the 12.5 MHz Local Byte
Clock (LBC). All Outputs change and all Inpuls are latched
on the riSing edge of LBC.

AFLAG

Internal DA Match (Short/Long: FCSL); Individual/Group: DIAG): Valid with DARCVD.

MFLAG

INTERNAL SA Match (Short/Long: FCSL); Valid with SARCVD

SAMESA

SA Same as in previous frame: Valid with
SARCVD on non-MAC frames.

SAMEINFO First four bytes of Info same as in previous
frame; Valid with INFORCVD on MAC frames.
VDL

Valid Data Length; Criteria-more than the
minimum number of bytes and an integral number of symbol pairs: Valid with EDRCVD.

VFCS

Valid FCS: Criteria-received FCS matches
with standard CRC polynomial: Valid with
EDRCVD.

The remainder of this section describes the structure of the
MAC Interface.
4.2 MAC INDICATION INTERFACE
Overview
Every byte of all incoming frames is presented at the MAC
Indication interface. The MID byte stream is effectively a
three byte time delayed version of the PID byte stream. Sequencing signals and addressing flags are provided to help
make the decision of whether or not to (continue to) copy
the frame.

Nate: The Flags are only valid when the corresponding sequencing Signal is
also set.

For setting the outgoing control indicators, the interface accepts the following:

The Sequencing Signals are asserted at different paints
within the frame. They are asserted under the following conditions:
when the Frame Control Field is on MID

DARCVD

when the last byte of the DA is on MID until the
next JK

SARCVD

when the last byte of the SA is on MID until the
next JK

EA

For external address matches for the setting
of the A Indicator (Bridging Group addressing,
Aliasing)

VCOpy

For the setting of the C Indicator

When AFLAG or EA is set and the EMIND bit of the Option
Register is set, the frame copied counter or the frame not
copied counter will be incremented depending on the value
of VCOPY for all repeated frames.

RCSTART when the Starting Delimiter is present on MID
FCRCVD

when a MACRST occurs or BMAC device is in
Stop Mode

Ten MAC Indication Timing Examples are shown in Figures

2-11.

4-80

LBC
MID IDLE
RCSTART

FCRCVD

FCSL

DAIG

IDLE

IDLE

IDLE

:JK

,'FC

pAO

OAI

SAO

(AI

INFOO

INF'01

INF'02

I~F'03

:::::::i:::

'ED

rs

10LE

------~Il

IDLE

:::::: IDLE

:JK

FC

~

--------~~r-1

r-l

~'_~ NEW ~ALUE

I NEW VALUE

------

--,

,

----,

DARCVD

AFLAG

1--vAliD

---~

SARCVD

.".

~

MFLAG

VALID

SAMESA

VALID

-----,

-~

INFORCVD

SAMEINFO

EDRCVD

I

VAUD

------------~~--~~------~----------~----;i=~:UD~i

lED

Irs

EA
VCOPY

I

VALID

I

VFCS

VALID

VOL

IVAUD

~
TL/F/10825-1

FIGURE 2. MAC Indication Timing Example-Short Frame

6S9"NV

iii

AN-6S9

LBC

.

MID IDLE

RCSTART

.......,......., .............................................................................................................................................. .....
IDLE

IDlE

IDlE

JK

n

Fe

DAO

~

H
,
,

F'CSL

I

DAIG

DAI

DA2

0A3

DA4

DA5

SAD

SAl

SAl

SA3

SA-4

SAS

!Hroo

INFOI

IHF02

INF03

ED

FS

FS

IDlE

: JK

: Fe

rL

'

~
,
NEW VAlUE

, NEW VALUE

~

DARCVD
AFLAG

:::::: IDlE

VAUD

----- ,

~

SARCVD

MFLAG

VAUO

SAMESA

VAUO

.j>.

Co

I\)

~

INFORCVD

SAMEINFO

EDRCVD

fV!U0-:-________~------.;,...--..,;.....JI

-

ED

'"

1______

'" ..

Sl

EA

~

vrcs

I -VAliD

VOL

VAlID

----,

TL/F/10825-2

FIGURE 3. MAC Indication Timing Example-Long Frame

LBC
MID IDLE

IDLE

IDLE

IDLE

RCSTART

: JK

n

:rc

~Al

pAO

DA2

DA3

OM

:IDLE

:IDLE::::::::::

IDLE

: JK

o

H

rCRCVD

,

rCSL

:rc

n0

h

,

0

NEW ,VALUE

DAIG

NEW VALUE

nl--------...;_-.--

rRSTRP

TLiF/1DB2S-3
Note: FRSTRP may be asserted any time after ReSTART; All signals are held at their current value until the next ReSTART.

FIGURE 4. MAC Indication Timing Example-5tripped Frame before SA

f"

LBC

'"

MID

a>

RCSTART

rCRCVD

rCSL

IDLE

IDLE

IDLE

IDLE

o

n
o

JK

o
o

Fe

'DAD

DAl

DA2

DA3

DA4

'DA5

SAO

SAl

SA2

SA3

SA4

'IDLE

n

IDLE

o

o

JK

rL
II
o

I NEW VALUE

I NEW VALUE

DAIG

---- --

L.:

DARCVD

~
rRSTRP

IDLE

~

~~~

1

____________~______________~f-l~______~~
TL/F/1DB25-4

Note: FRSTRP may be asserted any time afier RCSTART; All signals are held at their value until the next RCSTART.

FIGURE 5. MAC Indication Timing Example-Stripped Frame during SA

689-N'd

iii

AN·689

LBC
MID IDLE
RCSTART

fCRCVD

fCSL

DAIG

IDLE

IDLE

IDLE

JK

, Fe

______~r1,

'DAD

'DAt

DA2

CAl

DA4

'CAS

SAD

SAt

SA2

SAl

SA4

SA5

INFOO

INFOt

IDLE

'

IDLE

IDLE' JK

, Fe

~
,
,

-----------~rl

rI

--IIiEW~E

I NEW VALUE

DARCVD

f"1

AfLAG

VALID

ex>

-'"

--ll---i--

SARCVD

,

MfLAG

VAlID

SAIAESA

VALID

fRSTRP

~~~

i

__________~______________~______~r-1~______~~
TUF/l0825-5

Note: FRSTRP may be asserted any time aiter RCSTART; All signals are held at their value until the next RCSTART.

FIGURE 6. MAC Indication Timing Example-Stripped Frame after SA

LBC
~

______~rJ

MID IDLE
RCSTART

FCRCYD

IDLE

IDLE

IDLE

JK

re

DAD

-------.

-----.

OAt

DA2

DA3

DA4

DAS

----,

SAO

SAt

SA2

SA3

SA4

SAS

I

INrOD

INrOt,

NOT (DATA

'

OR 1)

---.
:::::::

IDLE

!I

FCSL

N~)ALUE

DAIG

I

DARCYD

---,----

NEW VALUE

7-'---:---!------.Jr-, ----

c"
(J1

r

AFLAG

1
1

~

SARCYD

I!-:--+_
r-VAL-ID-

MFLAG

SAMESA

FOERROR

re

r-L-

------~~~

.j>.

-.

JK

--- -

1

VALID

~

__~~________~______________~____~r-1~______~~
TUF/t0825-6

Note: FOERROR may be asserted at any time.

FIGURE 7. MAC Indication Timing Example-Format Error

689-N\f

iii

AN-689

LBC

I

L-I L-I L-I L-I
IDLE
IDLE
IDLE
: JK

MID IDLE

n

RCSTART

rCRCVD

: Fe

:DAO

:DA1

0A2

DA3

:DM

::::::: IDLE

: JK

: Fe

r-L

---------i--In

n
NEW ~ALUE

rCSL

NEW VALUE

DAIG

,
~..._ _ _ _......_.....;.._ _

MACRST*

TUF/l0825-7
Note: MACRST may be asserted if Mode Run ~ o.

FIGURE 8. MAC Indication Timing Exampl_MAC Reset

f"

g:
LBC
MID IDLE
RCSTART

rCRCVD

IDLE

IDLE

IDLE

JK

n

Fe

IDLE

IDLE

JK

Fe

r-L

n

n
I NEW VALUE (RESTRICTED/NON)

rCSL

TKRCVD

TT

___________

~nl.-...

___________

EDRCVD
TUF/l0825-8

FIGURE 9. MAC Indication Timing Exampl_Token Reception

LDC

WID IDLE
FRD

RCSTART

~
rCSL

IDLE

IDLE

IDLE

IIlLE

IDLE

IDLE

:JK

,

,: Fe

, JK

,re

,

,

-------~,

,

IDLE

n

DAD

I

ArLAG

~
.....

SAO

SAl

INfOO

INf01

INF02

INf03

SAO

~

~

~

~

~

INf04

!NrOS

iNros

INf07

INf08

INf09

ED

rs

IDLE

IDLE

IIlLE

IDLE

~

~

~

~

~

~

IDLE

IDLE

IDLE

IDLE

IDLE

IDLE

I

SAYESA

INrORCVD

,JK

,

"n

,: re
, re

~

,

n
NEW'JALUE

I

HEW VAlUE

:--- -.-

H

--------~-+_7~

1

,

VALID

I,

SARCVD

MrLAG

: JX

,

i---l

DAIG

DARCVD

DAI
OAl

I

DAD

~--~--------------------~LJ
VALID

~------------------------ILJ
,
.
I

VALID

------- ----------

SAMEINrO

EDRCVD

vrcs
VOL

+-__~--------------------~----------------------------~Iro

rs

I VALID

I VALID

-----1
TUF/l0825-9

FIGURE 10. MAC Indication Timing Example-Internal Stripping based on MFLAG

6S9-NY

II

AN·SS9

LBC
PID IDLE

J](

PC

DAO

OAf

MID IDlE

IDLE

IDLE

IDlE

:JK

:rc

PRO IDLE

IDLE

IDLE

IDLE

IJI(

Ire

RCSTART

FCRCVD

SAO

INF01

INroz

IHF03

INFO"'

INf05

INFOS

INr07

INF08

INF'09

::::::::rn

FS

IDlE

IDLE

JK

SAO

:SA1

INFOO

INFOf

INF02

I~F03

INFO"'

INf'OS

INrcG

tNF07

INroa

INFog :::::::ED

:rs

IDlE

IDLE

::::::: IDlE

IDLE:JK

SAO

'SA1

IDLE

IDlE

IDLE

IDlE

IDlE

IDLE

IDLE

IDLE

IDLE

!IDLE

IDLE

IDl.£

::::::: IDlE

IX.[

'DAD

I

'OAf

'IDlE
I

IDlE

:::::: 'IDLE
,

NEW *,"u,

CD

-----

VAll1l

..,

MFLAG

VAll)

SAUESA

VAll)

Elf

Fe

:-~

AFLAG

SARCVD

Fe

fIn
IJK

'

DARCVD

f>
CD

I

:-

I NEW VAlUE

DAIG

rc :::::::

INroo

:DA1

hi"
n

FCSL

:lDLE

SAt

:DAO

______-;-_i--r_~'VAlJD

IXXX~XXXX~

r "

I

I

INFORCVD

I

SAUBNFO

EDRCVD

VAll1l

jm

~~~~--~------~------------~

VFCS

VOL

~

I~

------.

rvAiiil;-

.~

TL/F/l0825-10

Note: EM may be asserted at any time; Stripping begins 3 byte times after EM is asserted.

FIGURE 11. MAC Indication Timing Example-External Stripping based on External MFLAG

RECEIVE SEQUENCER
An example receive sequencer is shown in Figure 12 for the
Indicate byte stream..

COPY CRITERIA
The decision to copy or not copy a frame is made by external hardware that looks at flags from the BMAC device qualified by the sequencing signals. The Copy decision may also
use inputs from additional address matching logic. The
Copy Criteria may be different for frames with different FC
values. For example, SMT frames might only be copied on
the basis of internal address matches while LLC frames
might be copied on the basis of external matches as well.
When using different frame copying criteria for different FC
values, the copy logic must latch the relevant bits of the FC,
or alternatively map the FC, or other fields within the frame,
to one of several groups, each of which share the same
copy criteria. The frame copying criteria might also be programmable in each group. The BMAC device thus provides
the mechanisms by which to create very complicated or
simple copy criteria.
A simple copy criteria might be as follows:

RSO:ldle
Remain in the Idle state while not copying any data or writing any status. Leave Idle when there is a place to put an
incoming frame and the beginning of a frame (RCSTARn is
received. At this point the Stage state is entered.
RSl1:Stage
Remain in the Stage state while deciding whether or not to
copy a frame. The decision is made at the commit point.
The commit pOint occurs any time after both the relevant
address comparisons are complete, and after the pOint in
the frame where it is not considered a legal fragment (4
bytes into the Information Field, when INFORCVD Is asserted). At the commit pOint the results of the address comparisons as indicated by the Flags from the BMAC device are
compared against the copy criteria. If the criteria matches
and no frame termination event has occurred, the decision
Is made to continue copying the frame and the Copy state is
entered. Otherwise, the Idle state is entered and the rest of
the frame is not copied.

All Frames

AFLAG and not MFLAG (so that you don't
copy frames that you sent, i.e., broadcast
and multicast)
A more sophisticated copy criteria might have different copy
criteria for each of several groups. In this example, groups
are differentiated by the FC.
MAC
Not (SAMEINFO and SAMEFC)
SMT
LLC Synch

AFLAG or MFLAG
Short and AFLAG and Not MFLAG

LLC Asynch
Reserved

Long and AFLAG and Not MFLAG
Do not copy

RS2:Copy
Remain in the Copy state while copying a frame into memory or temporary storage. Once committed to copying, continue copying until a Termination Event (TE) occurs. Upon a
TE, status is written. For every frame or partial frame copied, there should be a place to record status.
RS3:Status
Remain in the Status State while Status is being written.
After Status has been written, return to the Idle state.

Implementer Short and external address match
The copy criteria for MAC frames allows a station to skip
copying MAC frames with the same (first four bytes of) information and the same FC value.

RSO: Idle

RS1: Stage

RS2: Copy

RS3: Status

-~

-..--

-..--

-..--

RCSTART &c
,lasLpage

1£
,RSTART I
lasLpage

I
no status

status
loop

I
ST5

TLlF/10825-16

FIGURE 12. Example Receive Sequencer

4-89

en ,---------------------------------------------------------------------------------,
co
As a burst of frames is being received, several options are
CONDITIONS
~

z


set the TVX timers in all stations. During an immediate request from the CLAIM or BEACON states, when no CLAIM
or BEACON frames are ready, the internally generated
CLAIM or BEACON frames are transmitted.

Reporting Status related to a transmission is one of the
most challenging aspects of designing an interface to the
BMAC device. During a transmission several errors can occur. A transmission may be terminated unsuccessfully because of external buffering or interface parity errors, internal
Ring Engine errors, a MAC reset, or reception of a MAC
frame. When a transmission is aborted due to an external
error (and Option.IRPT is not set), a Void frame is transmitted to reset the TVX timers in all stations in the ring.
The BMAC device also guarantees that a valid frame is sent
with at most LMAX preamble (3.20 /Ls of preamble). This
alleviates the requirement from being handled by the interface logic. During a service opportunity when data is not
ready to be transmitted, Void frames are transmitted to re-

SERVICE CLASSES
A token capture class of "non-rstr" indicates that the transmitter token class must be non-restricted to begin servicing
the request. A token capture class of "rstr" indicates that
the transmitter token class must be restricted to begin servicing the request. A token issue class of "non-rstr" means
that the transmitter token class will be non-restricted upon
completion of the request. A token issue class of "rstr"
means that the transmitter token class will be restricted
upon completion of the request. (See Figure 13.)

RQRCLS (3:0)

Name

Class

THT

Token
Capture

Token
Issue

0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111

None
April_1
April-2
ApriL3
Syn
Imm
ImmN
ImmR
Asyn
Rbeg
Rend
Rcnt
AsynD
RbegD
RendD
RcntD

None
Asyncthsh1
Asyncthsh2
Asyncthsh3
Synch
Immediate
Immediate
Immediate
Async
Restricted
Restricted
Restricted
Async
Restricted
Restricted
Restricted

enabled
enabled
enabled
disabled
disabled
disabled
disabled
enabled
enabled
enabled
enabled
disabled
disabled
disabled
disabled

non-rstr
non-rstr
non-rstr
any
none
none
none
non-rstr
non-rstr
rstr
rstr
non-rstr
non-rstr
rstr
rstr

non-rstr
non-rstr
non-rstr
captured
none
non-rstr
rstr
non-rstr
rstr
non-rstr
rstr
non-rstr
rstr
non-rstr
rstr

Notes

1

4
4
4
2,3
2

2
2,3

2
2

Note 1: Synchronous requests are not serviced when RElR.BCNR is set.
Note 2: Restricted requests are not serviced when RElR.BCNR or RElR.ClMR are set.

Note 3: Restricted Dialogues only begin when a

non~restricted

token has been received and transmitted.

Note 4: Immediate Requests are serviced when the ring is non-operational. These requests ars serviced from the Data stats if neither RQCLM nor RaBeN are
asserted. tl RaClM is asserted, Immediate requests are serviced Irom the CLAIM state and il RaBCN is assarted, Immediate requests are serviced from the
BEACON state. RaClM and RaBCN do not cause transitions to the CLAIM and BEACON states. Function.ClM and Function.BCN cause these tranSitions.

FIGURE 13. Request Service Classes
MRO: NOT READY

MR1: READY

MR2: SENDING

MR(OI) __S;.;E;;;.RV;.;.IC==E~O-=PP~O~RT~U;.;NI;.;TY_ _ _-+I ( ) SEND FRAME
SET TXRDY
MR 12
SET TXACK
FRAME SENT &
END OF SERVICE OPPORTUNITY MR(10)
SET TXPASS

~ CONTINUE SERVICE OPPORTUNITY

SET TXRDY

MR(21)

I+_ _ _ _ _ _ _ _..::E:.;;ND;..O;;;F;.;.S::;E::;.RV;.;IC::;E;.;O;.:.P;.;PO:.:.R:.:.;TU;.:.N::;ITY.:...._ _ _ _ _ _ _ MR(20)
SET TXPASS
TL/F/l0B25-12

FIGURE 14. MAC Request Interface State Diagrams

4-91

Z

en
CD
CQ

en
co
~

Z

cc

r---------------------------------------------------------------------------------,
The Logical States of the MAC Request Interface
The MAC Request Interface has three logical states: either

RORDY and ROSEND are asserted, and ROFINAL has not
yet been asserted for this request.

the Ring Engine is not ready to service a request, the Ring
Engine is ready for the next frame from the interface, or the
Ring Engine is sending a frame from the interface. See Figure 14.

Continue Service Opportunity: The Service Opportunity is
continued after the current frame if valid service parameters
continue to be presented during the frame, and the timer(s)
used for the (next) requested service class have not
reached their threshold.

The values of TXRDY and TXPASS associated with these
three states are shown below.

State

TXRDY

TXPASS

Not ready
Ready
Sending
Internal error

=0
= 1
=0
= 1

= 1
=0
=0
=1

The table below shows the timer thresholds used for each
service class:

Conditions
Service Opportunity: A service opportunity occurs when it

Service Class

Threshold

All Requests
All Requests with THT Enabled
Priority Asynchronous Requests

TRT Expiration
THT Expiration
Asynchronous Priority
Threshold

End of Service Opportunity: The end of a service opportu-

The last latched version of RORCLS is used when RORDY
is asserted.

nity occurs when it is no longer necessary or possible to
continue the service opportunity. The service parameters
are continuously compared with the current state of the
Transmitter. If an unserviceable request is presented or any
time threshold is reached, the service opportunity will not
continue after the current frame (if any).

Send Frame: A frame can be sent from the interface when
at least 8 bytes of preamble have been transmitted, TXRDY,

Two MAC Request Timing Examples are shown in Figures
1Sand 16.

is possible to service the current request, as defined by the
current service parameters (RORCLS, ROCLM and
ROBCN).

4-92

TXRINGOP

RORCLS

..............

~L'~r1_'__________________________

TXPASSK

______________...1rr
1

~.

THTDIS

-------

FR Options
ROSEND
MRD

i

------. . . . .

cC

. . . . .

ROEOF

;11;2Ii~I;41;51;61~,;81·li~li~l·

~

.....

TXCLASS

: : : : :

PRD

ii Ii Ii ii

.......... : 1~1 ~1:1 :11;2Ii~II~II:511:4~1:8 :li~l:z" .................. .

••••••••••••••••••••

j

••••••••••••••••••••••••••••

·4···············I··:······~·····················

JJ'-____________

jJ'

"'--'--'-1

..
ROFINAL

LI__.--.--.-. . . . . . . . . . . . . . . . . . . . . . . .

~~~~~.~ . . . . . . . . . . . . . . . . . . . . . . ~~.~:~~~~~~~~~~~~

-.-.-.-.-. -.-.-.-

TXED -'-'-'-'-'

•

.'. ~AI.~Dn~IL.•

TXACK

: : : : :

•

...i;'---________________

1

_ _ _ _ _ _-1 VALID I

. . . . . . .

ROABT

•

Ir1

------- ......... ";1 ;1

TXABORT

•

. . . . . . . .

.l>-

"'I

•

Ir1

~--

TXRDY

\I n

:(~

~.

RORDY

n jk Ie

Itrrr Ii
. . . . . . . . . . . . . . . . _.-.-,..""'.-,-._.-.--'

................

ii'l' ,

. • n' 11'
______________..., tr rr
. . . . . 1...-...,-,-..,.....-,.-

iI jk Ie \I

. ................. '. [lL..,..
. .,.-,-,.......

~
~ ~ Itkfn ..~

~
.. .. .. .. " .. " .. , jk i1 12 i3 S A i6

iw ix Iy iz 11 12 f3 14 tr

IT

I ii

ii

1

I jk 111

i2 i3 S A is

iw ix iy iz 11 12 13 14 tr

IT I"

"

..

..

..

..

..

..,

TUF/10825-13

FIGURE 15. Asynchronous Request with Prestaging
(normal completion after two frames)

689-N'd

II

AN·689

lXRINGOP

lXPASS~

· ...................
. , . , . ,. ,. i .

rrOOOOOOOOJkfcllOO

.

RQRCLS ..Jr,Ir2lr3Ir4IrSlrS
RQRDY

r;;--

. • • . ••

~ ........................
.
· ............
.
---'L,-,.....,.....,....,.....,....,....,..
lXRDY~.~.
IrS

TXTHTDIS

.~ .VA~ID .1 . . . . . . . . . . . . . . . . . . . . . . ~. V~LID. LI._._._._._._.. ________________
.......................................

fR Options

RQSEND
MRD

t

."..

••••••••••.
.•••••••••

~ ••••.•••••••••• ~ •••••••••••••••••••••••

:jl~ I~ '~H~Hi~H+ .1'd~L

lXACK _ _ _ _ _ _ __

:j~lI~ ,+H,~H,~H{H~z

--,

~

.(. .,. .,. . ,. . ,. . ,. . ,. . ,. . ,. . . . ,. . ,. .,. . ,. . ,. ,. . ,. . ,. . ,. .,.

1 ....._ _ _ _ _- - -

~

RQABT . . . . . . . . . . • • • . • • • • • . • • . • • • • • • • • • • • . •
lXABORT

.

I. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . .

..J;;J

RQEOf _.:--:".-:".-:.-:".""!."""'!'".-:."""'!'"._.:". • • • • • • • • • • •

.............. . .. . .... .. .. . .... .. .. . .... .. . .
......................
. . . . . . . . . . . . . .~
. . ....................
................ . .
;-.;.....;....~

lXED

_ _ _ _ _ _ _....I.trrr
II 0 0 D 000 OJkfc11t
0
i
i

Ilr rr 0 0 0 0 -;;-;;-;;"]

RQflNAL ",.:--:".-:".-:.-:".""!."""!"."'.:--:-.",.:".
lXCUSS _______

·..

~

. . .

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

•

......... n........... .

•

_____________________________________

..............

PRD~

HHH"

.

IJkI1I213SA'6

. . . .

.........

iwixlyizllf2f3f41rrr

l!.!.!.

. ................ .
IJkl11213SAi6

lwixlylzllf2f3f4trrr 10000

o~
TUF/l0825-14

FIGURE 16. Asynchronous Request without Prestaging
(token times out during second frame)

.

l>
REQUEST MACHINE

rising edge of TXPASS or TXRDY. While TXACK is asserted, data is transmitted rrXACK could be used as an enable
for a byte counter). On the last byte of the frame, ROEOF is
asserted and in response TXACK is deasserted. TXACK is
used by the frame level handshake and ROEOF is returned
from the frame level handshake. The Request Machine
does not use TXACK or provide ROEOF.
The Last Frame and Last Request Signals help control the
sequencing for multiframe requests or multirequest service
opportunities. Only between requests can the Requested
Service Class change. The frame options may change on
each frame.

The Request Machine shown in Figure 17 is a simplified
version of a Transmit Sequencer. This could be used as the
basis for many designs.
Note that all signals that begin with TX come from the
BMAC Device Transmitter, and all signals that begin with
RO come from the PAL Sequencer (the Request Machine or
Transmit Sequencer).
RQO:IDLE

While in the Idle State, there are no frames to be sent and
all of the status from previous frames has been reported.
When a frame is to be sent, it is loaded into the temporary
buffer. Once a frame is ready to be sent RORCLS is loaded
with the appropriate value. This requests a service opportunity as described by the 4-bit RORCLS field in addition to
the ROCLM and ROBCN which are used with Immediate
transmissions. A transition to the Ready State then occurs.

RQ3:STATUS

After the frame is sent, status related to that frame is written
or accumulated as appropriate either on the transmitted
frame only or the returning frame as well. In short rings, this
should be several byte times after the frame is transmitted,
but in large rings there could be a several microsecond delay.

RQ1:READY

RORDY is asserted to indicate that the interface has or will
soon have a frame that is ready to be sent. RORDY causes
the RORCLS to be latched into the BMAC device and used
while RORDY is asserted. Once the token is captured a
transition to the Send State occurs. Alternatively, enough
data could be loaded into temporary storage to keep it not
empty over transmission of the frame.

Conditions
Frame_Ready
• Frame_Ready is True when a frame is ready to be sent
• The Frame options (SAT, SAIGT, STRIP, FCST) must be
valid at this time.
Instead of loading the entire frame into the temporary buffer before telling the MAC Interface, it would be possible to
load in enough of the frame to guarantee that the temporary buffering will have enough data to keep up with the
ring over the duration of the frame. An implementation like
this could employ a FIFO or an equivalent speed matching
device to match or smooth the bandwidth characteristics
of the hardware feeding the temporary buffering.

RQ2:SEND

Upon entry to the Send State ROSEND is asserted and the
Frame Options are latched by the MAC interface. TXRDY is
deasserted and TXACK asserted when the beginning of the
frame is sent. A flag is set that causes us to remain in the
Send State until the end of the frame as denoted by the

- ..--

-r--

-r--

RQRCLS >0 &
Frame_Ready
SET RQRDY

z

0)

CD
CD

-..--

Started_to_Send &
(TXRDYI TXPASS)
TXRDY
Set RQSENDClear
Started_to_Send

~ Frame_Ready

~ TXRDY&~ TXPASS

Set Started_to_Send
If LastJrame
Clear RQRDY
If Last_Request
Set RQRCLS =0

IRQRCLS =0

I

Status Complete & ~ LasLFrame
Status Complete & LasLFrame

TL/F/l0B25-17

FIGURE 17. Example Transmit Sequencer

III
4-95

Holding the Token
At end of the frame, TXRDY is asserted if possible (THT or
TRT has not expired) or desirable (there are more frames to
transmit on this service opportunity). Otherwise TXPASS is
asserted.
Issue Token Class
If RQRCLS goes to zero at any time during a service opportunity a token will be issued.
TXCLASS indicates the class of token that was issued, in
the case of TXPASS, or would have been issued in the case
of TXRDY. Since the issue token class is given in the
RQRCLS encoding, this is a sanity check, especially in a
non-pipelined implementation .
For certain SMT frames (NSA frames), the returning status
is of considerable interest. In these cases, it may be easier
to just turn on copying of SMT frames based on MFLAG
(i.e., AFLAG or MFLAG instead of the normal AFLAG and
not MFLAG). The status can be the same as the reception
status.

Notice that on the transition to the Ready State
RQRCLS>O is also used as a condition. This implies that
the token could be captured before the data is actually
ready. In other words, from the word go a race takes place
between the data becoming ready in the temporary buffering and the MAC capturing a useable token.
StartecL.to_Send
• This is true any time after the MAC transmitter has started
to send a frame.
Status-Complete
• This is true when status for the transmitted frame has
been recorded.
• This may be a result of the transmitted frame, and optionally the returning frame.
Notice that in the case where status is written for every
frame, additional frames may not be transmitted until after
status is written. A further alternative approach would allow status on frames of a request to be stored in a temporary location and then only write status between requests.
An extension to this idea would be to store temporary
status separately for each individual request. This last approach would allow both of the Status Complete transitions to occur immediately. At some point however the
interlock with the actual writing of status would have to
occur. For example, even in the case where status is written into temporary storage for each request, a new request could not be started until status for the previous
request has been written.

PROVIDING A TRANSMISSION CONFIRMATION
SERVICE
Providing a Transmission Confirmation Service is one of the
most challenging aspects of designing an interlace to the
BMAC device. Some useful hints for providing such a service are given below.
Overview
A transmission confirmation service returns ending status
for a request to transmit one or more frames. As frames of a
request are transmitted, the status on the returning frames
is accumulated. When all of the frames of the request return
around the ring, a positive status is given. Should anything
other than the expected frames (with the correct FC, SA,
FCS, and frame status values) return before all of the transmitted frames return, a negative status is generated. Status
is thus generated when either all of the frames return, or an
abnormal condition is detected.

A pipelined multiple request machine could even take the
status-complete and lasLframe transition before the
end of the frame and begin to load in the new parameters
for the next frame. This would allow frames of the next
Request to be transmitted very soon after the frames of
the previous Request.
TRANSMISSION STATUS
Transmission status concerning the previous transmission
is valid in all cases one cycle after TXRDY or TXPASS is
asserted.
Transmission Completion
If an Ending Delimiter was transmitted TXED will be active
one cycle after TXRDY or TXPASS is asserted until the
starting delimiter of the next frame is transmitted. If the
frame was aborted TXABORT is active one cycle after
TXRDY or TXPASS is asserted.
The frame could have been aborted for several reasons:

The transmission confirmation service is similar to
the (SM_)MA-UNITDATA-STATUS.indication (formerly
called (SM-lMA-DATA.confirmation) defined in the ANSI
FDDI MAC standard.
Ring Assumptions
• Returning frames can be associated with transmitted
frames.
At most one request can be serviced (for each SAP) during a given token opportunity. Since the order of SAP
serviced is fixed, the order for matching returning frames
with their corresponding requests is also known. The returning FC, SA and FCS could be used to distinguish a
frame transmitted by this station and match it with its corresponding SAP. Additional fields may be used to increase
confidence in the association.
• Frames return in the order transmitted.

• a MAC Reset
• the ring going non operational
• an internal BMAC device error
• an RQABORT during the frame
TRT Expiration
If TXPASS is asserted and THT was disabled during the last
frame that was transmitted (THTDIS is asserted), TRT has
expired. This is a serious error and indicates that there was
an overallocation of synchronous bandwidth or a station
used more than it was allocated. The ring will likely be in the
CLAIM state when this occurs.

We assume that no frames are maliciously inserted into
the ring.
• After a token is captured by a station for transmission, the
next returning frames will be those transmitted by this station.

External CLAIM/BEACON Transmission
When transmitting CLAIM/BEACON frames from the
CLAIM/BEACON state, if TXPASS is asserted the CLAIM/
BEACON process is complete. In this case TXABORT indicates if this station won (TXABORT=O) or lost
(TXABORT= 1) the CLAIM/BEACON process.

Since there is a single token, the next frame received by
this station should be the (first) one it transmitted unless
another station has failed to strip its frame(s).

4-96

~----------------------------------------------------~~

• Synchronization points:
At these synchronization pOints, the number of frames
transmitted and the number of frames received should be
equal.

• Frame Lost due to line hit
This type of error is more difficult to handle because it
cannot be detected until the next synchronization point. At
the next synchronization point the received and transmitted counts for the current request will not be equal. A
negative confirmation is generated and the request is optionally terminated.

• Token received
• Frame with a different SA is received, after receipt of a
frame with my SA.

• Frame not recognized by source station

Error Conditions

This type of error is more difficult to handle because it
creates a false synchronization point. At this point the received and transmitted counts for the current request will
not be equal. A negative confirmation is generated and
the request is optionally terminated.

• Frame not recognized by addressed station
No station recognizes the Destination Address, and as a
result the A indicator is not set. Either the station is not
present or a line hit corrupted the Destination Address.
• Frame not copied by addressed station

• Frame incorrectly recognized by source station

The addressed station runs out of buffering resources and
as a result does not set the C indicator. This is probably
the most likely of the error conditions.

This condition will be detected unless the line hit caused a
formerly invalid FCS to become valid. When detected, this
condition may produce a false negative confirmation, but it
will not produce a false positive confirmation.

• Frame Error due to line hit
For example when a line hit causes an FCS error.

5.0 Bridging/External Matching
Support

• Frame Lost due to line hit
For example the starting or ending delimiter is destroyed,
or a data symbol becomes a non-data symbol. This may
have different effects when the lost frame is:

There are two major considerations for MAC level Bridging
products on FDDI:

•

first frame of request

1. How stripping will be accomplished and

•
•

a middle frame of a request
the last frame of a request

2. How the control indicators will be handled.
The FDDI standard does not have a recommended Bridging
algorithm like 802.3's Transparent Bridging and 802.5's
Source Routing Bridging.

• Frame not recognized by source station
A line hit corrupted the FC or the Source Address.

The issue with stripping is that every station needs to strip
every frame it transmits. Typically this is accomplished by
stripping based only on the Source Address. However, in
bridging applications where the SA is not necessarily of this
station, this station needs to either watch out for all of its
frames (and use CAM technology to assist the strip decision) or use some other mechanism. Currently, the FDDI
X3T9.5 Committee has agreed that the strip pOints of all
frames is before the fourth byte of the INFO field. That implies that any fragment with more than three bytes of INFO
is an illegal fragment.

• Frame incorrectly recognized by source station
Frame insertion or misdirection can occur during reconfiguration, but CMT will remove such frames by scrubbing.
An alias could be caused by a line hit on the FC or SA, but
it is highly unlikely to contain the proper FCS value (this
would require multiple errors or an unfortunate pattern on
a transparent FCS transmission). Indiscriminate use of
transparent FCS transmission could diminish the integrity
of the confirmation service.

Error Handling
For each request, an expected status parameter is given
either explicitly with the request or implicitly (it was given
explicitly previously and has not changed). The expected
status contains the expected value of the returning FCS, E,
A and C indicators. If the expected value of these indicators
is not returned, a negative confirmation is generated.

The BMAC device provides an alternate stripping mechanism to accomplish the stripping by sending out two
My_Void frames before the token and stripping everything
until the first My_Void returns.
The definition of a bridgeable frame also has impact in
bridging applications. Only LLC frames are bridgeable. Management frames (MAC and SMT frames) are not bridgeable.
BEACON frames, CLAIM frames and SMT frames are local
to a Single ring. Likewise, synchronous and restricted dialogs are local to a Single ring.

• Frame not recognized by addressed station
This condition can be handled using the expected status.
The returning A indicator is not set, so the expected frame
status is not returned. A negative confirmation is generated and the request is optionally terminated.

5.1 EXTERNAL MATCHING LOGIC

• Frame not copied by addressed station

External Matching Logic is used to allow this station to recognize additional addresses. These additional addresses
may be aliases (additional addresses that are not this station's management address) or additional group addresses
not recognized by the BMAC device. In addition, more perfect filtering or routing could be done on certain classes of
frames. Certain bridges and routers (not 802.1 d transparent
bridges since these address matches do not set the ~ind)
can be viewed as having a set of aliases.

This condition can be handled using the expected status.
The returning C indicator is not set, so the expected frame
status is not returned. A negative confirmation is generated and the request is optionally terminated.
• Frame Error due to line hit
This condition can be handled using the expected status.
The returning E indicator is not reset or the FCS is invalid,
so the expected frame status is not returned. A negative
confirmation is generated and the request is optionally terminated.

4-97

z

&,
Q)

CD

en ,---------------------------------------------------------------------------------,
CD

(I)

:Z
cC

bridge will only set the A-INO if the frame is explicitly addressed to the bridge and may optionally set the C_INO for
all frames copied with the intent to be forwarded. If an end
station receives a frame addressed to it with the A indicator
reset, the C indicator set, and it does not copy the frame,
the station sends it out with the A indicator set but the C
indicator reset.

The result of the address comparison is then fed into the
copy criteria and used to set the A indicator .(the BMAC
device EA input). The C indicator should be set as usual
unless the frames recognized by the external matching logic
are sent to a different buffer memory and generate a separate VCOPY signal.
There are two choices of where the external matching logic
may tap into the data stream, either at the PHY Indicate
Interface or at the MAC Indicate Interface. We recommend
using the PHY Indicate Interface between the PLAYER device and BMAC device, because it provides a three byte
time advantage over the alternative.

END STATIONS
For end stations and bridges which also act as end stations,
the BMAC device always implements the option recommended by the Bridging Working Committee to X3T9.5. For
frames with A not set and C set for which the station intends
to Set the A indicator but not the C, the A indicator is transmitted as set and the C indicator is transmitted as Reset.

When using alias addressing it is also possible to strip
frames on the basis of these additional aliased source addresses if the STRIP option is not used or desired. Three
byte times aiter the EM signal is asserted, Idle symbols are
transmitted into the ring and the frame is stripped.

BRIDGES
For stations acting as bridges, the committee recommends
that for frames copied with the intent to forward (for which a
station address or alias match did not occur), only the C
indicator should be set, not the A indicator.

5.2 SA, SAIG, FCS TRANSPARENCY OPTIONS
These transparency options are particularly useful in bridging applications. The SA transparency options are useful in
certain Transparent Bridging algorithms and in Source Routing Protocols. The SA and SAIG transparency options allow
the SA to be sent transparently from the data stream as
opposed to being sent from the MAC Parameter RAM. The
FCS transparency is particularly useful between bridged
rings (end to end FCS checking with FOOl to FOOl bridges).
The FCS transparency could also be useful for diagnostic
purposes and with implementer defined FCSs on implementer frames.

To accomplish this, since the BMAC device will not set the
C indicator without setting the A indicator as well, it is necessary to intercept the byte stream between the BMAC device and the PLAYER device. Fortunately, the difference
between the Rand S symbol is only a single bit. Thus, when
a frame is copied with the intent to forward it, the received A
indicator is not set, and the station's AFLAG is not set, the C
indicator must be changed from an R to an S. This occurs
one byte time aiter EORCVO is asserted and requires that
PRO(O) be changed from a 0 to a 1.

5.3 IMPLEMENTING THE BRIDGING COMMITTEE
RECOMMENDATIONS

This easily fits into a small slice of a PAL and is only required in bridges implementing this option.

The meaning of the control indicators also is impacted in
bridging applications. The ANSI committee decided that a

4-98

.------------------------------------------------------------------.~

~~

BSITM Device Software
Design Guide

National Semiconductor
Application Note 730
Robert Macomber, Mark Travaglio

Table of Contents

corresponding bits in the CMP register will be actually
stored in STAR. With the BSI device in "Stop Mode", and
no intervening accesses to the BSI device Control Bus, it is
guaranteed that all 8 bits will match.

1.0 INTRODUCTION
2.0 INITIALIZATION

Finally, write Ox07 to the STAR. This clears all the error bits
and sets all the stop bits (the STAR is automatically loaded
with Ox07 upon reset of the BSI device).

3.0 SERVICING INTERRUPTS
4.0 MEMORY MANAGEMENT SCHEMES
5.0 SENDING FRAMES

2.2 Set the Mailbox Address Register

6.0 RECEIVING FRAMES

When loading Pointer RAM data into the BSI device, a
"mailbox" mechanism is used. The mailbox is a 32-bit word
in off-chip memory which the BSI device uses to load or
dump the Pointer RAM Registers. This mailbox may be located anywhere within the 28-bit ABus address space of the
BSI device and accordingly its address must be explicitly
defined. This is accomplished via the 8-bit Mailbox Address
Register (MBAR).

7.0 QUEUE MANIPULATION
1.0 INTRODUCTION
This application note describes how to initialize the National
Semiconductor BSI device (DP83265) and interact with it.
Initialization and data service support occur through the
Control Bus and via memory that is accessible by both the
BSI device and the host. The host processor must be able
to respond to interrupts and have access to both the BSI
device Control Bus and some mutually accessible memory.
This application note should be read in conjunction with the
BSI datasheet.

To load the Mailbox Address Register (MBAR) first load
OxOO into the Pointer RAM Control and Address Register
(PCAR). This tells the BSI device to internally point to the
first byte of the mailbox address. Then execute four successive writes to the MBAR to load the full mailbox address;
writing the most significant bytes first. Each write automatically increments the byte pointer to the next byte.
When the BSI device is reset, the Mailbox Address Register
(MBAR) is loaded with a hardware revision code. The host
may obtain this revision code by sequentially reading four
bytes from the MBAR before loading the mailbox address.

2.0 INITIALIZATION
Before BSI device operation can begin, the device must be
initialized. The BMACTM and PLAYERTM devices must also
be individually initialized. To initialize the BSI device, the
steps shown below should be followed. Each action is explained further in the subsections that follow.
o Put the BSI Device in Stop Mode
o Set the Mailbox Address Register
o Load the Pointer RAM
o Set the Event Notify Registers
o

Set the Mode Register

o Set the Request Configuration Registers
o Set the Request Expected Frame Status Registers
o Set the Indicate Configuration Register
o

Set the Indicate Mode Register

o Set the Indicate Threshold Register
o
o

Set the Indicate Header Length Register
Load the Limit RAM

2.3 Load the Pointer RAM
The BSI device maintains pointer registers for acceSSing
and manipulating the various queues. Prior to normal operation, some of these pointer registers must be initialized with
queue addresses (see Table I). For active Request queues
the host software must load the Confirmation Message
(CNF) Queue Pointer Register and the Request (REQ)
Queue Pointer Register. For Indicate queues the host software must load the Indicate Data Unit Descriptor (lOUD)
Queue Pointer Register and the Pool Space (PSP) Queue
Pointer Register. For information about choosing initial
Pointer RAM values see Section 7 on Queue Manipulation.
TABLE I. Pointer Registers Used
during Queue Initialization

o Clear the Attention Register
• Put the BSI Device in Run Mode

Painter Registers
CNF
REQ
CNF
REQ
lOUD
PSP
lOUD
PSP
lOUD
PSP

2.1 Put the BSI Device in Stop Mode
During initialization the BSI device must be in "Stop Mode".
This is necessary to prevent the device from attempting to
perform any actions or respond to any external stimulus prior to the completion of the initialization sequence. The BSI
device may be placed in Stop Mode by setting three bits in
the State Attention Register (STAR).
Since the State Attention Register (STAR) is a conditional
write register, it must be read before it is written. By doing so
the original contents of the STAR register are loaded into
the Compare Register (CMP). When a subsequent write to
the STAR register occurs, only those bits that match the

Queue Pointer Register (RCHN1)
Queue Pointer Register (RCHN1)
Queue Pointer Register (RCHNO)
Queue Pointer Register (RCHNO)
Queue Pointer Register (ICHN2)
Queue Pointer Register (ICHN2)
Queue Pointer Register (ICHN1)
Queue Pointer Register (lCHN1)
Queue Pointer Register (ICHNO)
Queue Pointer Register (ICHNO)

Addr
Ox02
Ox03
Ox06
Ox07
Ox09
OxOa
OxOd
OxOe
Oxll
Ox12

Before loading a Pointer RAM Register, first read the Service Attention Register (SAR) to verify that the PTOP bit is

4-99

•

C)

~

:i

r---------------------~--------------------------------------------------------__,

Indicate breakpOints are instances that generate interrupts.
You may configure the BSI device to interrupt at the end of
each service opportunity, at the end of a burst (i.e., channel
change) or after a user defined number of frames have
been received. Prudent use of Indicate breakpoints can significantly reduce interrupt processing overhead by reducing
the number of Interrupts generated by the BSI device.

set; signifying that a previous Pointer RAM operation has
completed. If this bit is not set wait for the previous operation to finish.
Write the value one wishes to store in the Pointer RAM
Register (i.e., the base address of the relevant queue) in the
memory location selected as the BSI device Mailbox.
Next configure the Pointer RAM Control and Address RegIster (PCAR) with the PTRW bit cleared and the address of
the Pointer RAM Register placed in the least significant five
bits. A zero value in the PTRW bit specifies that the next
Pointer RAM operation will read from the Mailbox and write
to the Pointer RAM Register. The two most significant bits in
the PCAR (BPO, BP1) are not used in this context and may
be loaded with O's. For example, when loading the PSP
Queue Pointer for Indicate Channel 0, one would write Ox12
to the PCAR.
Finally, clear the PTOP bit in the Service Attention Register
(SAR). The SAR is a conditional write register, so it is necessary to read it immediately before writing to it. Clearing
the PTOP bit causes the BSI device to perform the actual
Pointer RAM operation. The device Signals the completion
of the operation by setting the PTOP bit in the SAR.

2.10 Set the Indicate Threshold Register
The Indicate Threshold Register (ITR) specifies how many
frames must be received before a threshold breakpoint is
realized. The value in this register is only used when the
appropriate bits are set in the IMR.
Loading the ITR with OxOO specifies a value of 256. This
value is loaded into an internal working register each time
the state of any Indicate Channels change.
2.11 Set the Indicate Header Length Register
If the Headerllnfo frame sorting mode is specified. one
must load the Indicate Header Length Register (IHLR) with
the length (in units of four byte words) of the header portion
of the frame. The FC field occupies an entire word. For example, to separate an 8 octet header when using long. sixoctet MAC addresses, one would load a value of 6 (FC = 1.
DA/SA = 3, header = 2) into this register.

The above steps must be done for all painters associated
with those channels that will be used.

2.12 Load the Limit RAM
During normal operation of the BSI device, the CNF and
lOUD queues must be given status space. This, may be
done as part of the initialization procedure. For information
about choosing initial Limit RAM values see Section 7 on
Queue Manipulation.

2.4 Set the Event Notify Registers
You may specify which events will trigger an interrupt by
setting the corresponding bit in the Notify Registers; where
a 1 enables interrupts from that event and a 0 disables
those interrupts. The Notify Registers may be written without being read previously (not conditional write registers).
See Section 3, Servicing Interrupts, for a more complete
treatment of this subject.

Before loading a Limit RAM Register, first read the Service
Attention Register (SAR) to verify tihat tihe LMOP bit is set
(signifying that the previous Limit RAM operation has completed). If this bit is not set wait for the previous operation to
finish.
Next load the Limit Address Register (LAR). The top four
bits of the LAR define the target Limit RAM Register, the
LMRW bit specifies what the next Limit RAM operation will
be (LMRW = 0 means a write to the Limit RAM) and the
MSBD bit contains the most-significant data bit of the 9-bit
Limit value.
Next load the Limit Data Register (LOR) with the lower 8 bits
of the limit value.

2.5 Set the Mode Register
Load the BSI device Mode Register (MR) to configure the
BSI device with global bus and queue parameters. For example a value of Ox52 causes the BSI device to generate 32
byte bursts when accessing the data bus, use 1k (small)
queues, operate in a physical memory environment, use
"big-endian" data alignment, check parity on access to the
ABus and Control Bus and optimize operation for clock
speeds over 12.5 MHz.
2.6 Set the Request Configuration Registers

Finally. write a 0 into the LMOP bit in the Service Attention
Register (SAR). The SAR is a conditional write register,
making it necessary to read it immediately before writing to
it. Clearing the LMOP bit causes the BSI device to perform
the actual Limit RAM operation. The BSI device signals the
completion of the operation by setting the LMOP bit in the
SAR.
Repeat the above steps for all desired limits.

Load the Request Configuration Registers (ROCR and
R1CR) for both Request Channels (RCHNO and RCHN1) to
establish channel specific operating parameters; such as
Source Address and Frame Control Transparency.
2.7 Set the Request Expected Frame Status Registers
Load the Request Expected Frame Status Registers
(ROEFSR and R1EFSR) for both Request Channels
(RCHNO and RCHN1) to set up the expected status for
frame confirmation services. A value of OxOO in these registers means that any frame status is acceptable.

2.13 Clear the Attention Registers
Clear the Request Attention (RAR) and Indicate Attention
Registers (IAR) by first reading the register, to load the
Compare Register (CMP), and then writing a OXOO value to
the register. Both of these registers are automatically initialized to 0 upon BSI device reset.
The No Space Attention Register (NSAR) should be initialized to reflect the state of space of all the queues. If space
was given to all of the CNF and PSP queues, read and write
OXOO into NSAR.

2.8 Set the Indicate Configuration Register
Load the Indicate Configuration Register (ICR) to establish
copy control parameters for each Indicate Channel. A typical register value is Ox49; which instructs the BSI device to
copy frames addressed for the owned MAC address or to
an externally matched group address.
2.9 Set the Indicate Mode Register
Load the Indicate Mode Register (lMR) to set the frame
sorting mode, skip option and the desired Indicate breakpOints.
4-100

r-------------------------------------------------------------------,>
2.14 Put the BSI Device In Run Mode

=F
......

TABLE II. Attention Registers

Initialization of the BSI device is now complete. The device
may be made fully operational by reading the State Atten·
tion Register (STAR) and immediately writing OxOO to it. This
will clear the stop bits for the Indicate, Request and Status/
Space machines; putting them in "Run Mode".

Master Attention Register (MAR)
State Attention Register (STAR)
No Space Attention Register (NSAR)
Service Attention Register (SAR)
Request Attention Register (RAR)
Indicate Attention Register (IAR)

The BSI device should immediately begin fetching PSP De·
scriptors for the Indicate Channels to use for frame recep·
tion. At this point a write to one of the REQ queue Limit
RAM Registers would cause the BSI device to begin fetch·
ing REQ Queue Descriptors for frame transmission.

The host may control which attention bits will generate an
interrupt by configuring the Notify Registers (see Table III).
TABLE III. Notify Registers

3.0 SERVICING INTERRUPTS
Master Notify Register (MNR)
State Notify Register (STNR)
No Space Notify Register (NSNR)
Service Notify Register (SNR)
Request Notify Register (RNR)
Indicate Notify Register (INR)

The BSI device provides facilities for selecting which events
will generate an interrupt and a mechanism for determining
which events are present after an interrupt has been raised.
3.1 Event Registers
The BSI device supports a two-level hierarchy of Event Registers; where the presence of attention signals in lower level
attention registers is recorded in a single upper level attention register. Attention signals may be disabled at either of
the two levels. Events may only be cleared by resetting the
attention bits in the lower level registers.

For each Attention Register a corresponding Notify Register
exists. Each Attention Register is ANDed with its corresponding Notify Register and then all of the resulting signals
are ORed together and presented to the next level (see
Figure 1).

The upper level attention register is called the Master Attention Register (MAR). It contains five attention bits that indicate the presence or absence of any events recorded in
each of the five corresponding attention lower level registers. Those registers are listed in Table II.

For example, to disable all interrupts caused by service
events: clear the Service Attention Register Notify (SVAN)
bit in the Master Notify Register (MNR). To disable only interrupts caused by Pointer RAM Operations: set the SVAN
bit in the MNR and clear the PTOPN bit in the Service Notify
Register (SNR).

Int.rrupt Signal

Ma.t.r Notify
Ma.t.r Att.ntion

stat. Notify
Stat. Att.ntlon
TLlF/ll088-1

FIGURE 1. BSI Device Event/Notify Registers

4-101

~

or-------------------------------------------------------------------i
~

Z

11(

When checking attention registers for the cause of an interrupt, one should perform a bit-wise AND operation between
the attention and notify registers and examine the result.
Just checking the attention registers may be misleading. For
example, to disable an Indicate Channel one may wish to
leave its PSP queue empty and mask off the "Low Data
Space" attention bit for that channel; via the Indicate Notify
Register (INR). Under these circumstances the IAR, by itself, may contain misleading information.

• attaching the previous page to a PSP Descriptor of the
same queue
• incrementing the PSP Limit Register for that queue
The management of space for ODUs (outgoing frame data)
and ODU Descriptors (ODUDs) must be done by the host.
A fully allocated 1k PSP queue consumes 512 kbytes of
buffer space. A fully allocated 4k PSP queue uses 2 MB of
buffer space.

3.2 Example Procedure

4.3 Shared Buffer Pool

A typical procedure for servicing BSI device interrupts is as
follows:

To maximize memory utilization, multiple Indicate Channels
may share a single pool of data buffers. This does not mean
that Indicate Channels can be made to share a Pool Space
(PSP) queue, but rather that data buffers attached to the
various PSP queues are allocated and freed from a global
buffer pool on an "as needed" basis. When using a shared
buffer pool, the Indicate buffer management becomes the
following:

• disable host interrupts
• determine the event that triggered the interrupt by checking the Master Attention Register and then querying the
appropriate lower level attention register
• process the event (or post the event to a service queue)
• clear the attention bit (or mask the attention bit)

• Detecting page boundary crosses; to determine when
the BSI device is finished filling the previous page

• enable host interrupts

4.0 MEMORY MANAGEMENT SCHEMES

• Obtaining confirmation that the host has finished processing all frames in that page

The BSI device may be configured to use memory shared
between itself and the host or it may be configured to use
the host's memory. In addition, it can be made to operate in
a vitural memory environment.

• Returning that page to a shared buffer pool or, upon determining that the page has been dedicated to a given
channel, reattach the page to the channel's PSP queue
• Responding to interrupts caused by a "Low Space" condition by allocating buffer space to one or more PSP Descriptors and incrementing the PSP Limit Register for
that queue

Although the BSI device manages space for incoming data
(from channel specific Pool Space (PSP) queues); the host
must implement a memory management mechanism to replenish the PSP queues and manage the space needed to
hold output data (ODU) and ODU Descriptors (ODUDs).

Again, the management of space for ODUs (outgoing frame
data) and ODU Descriptors (ODUDs) must be done by the
host.

4.1 Memory Requirements
Up to ten distinct queues may be established; two for each
channel. Depending upon the value of the Small Queue
(SMLQ) bit in the Mode Register (MR), these queues will
each consume 1k or 4k of memory; collectively occupying
either 10k or 40k of memory.

One danger with sharing pool space is that a heavily used
low priority channel may starve a high priority channel by
consuming all of the buffer space. This is contrary to the
idea of priority. It is recommended that some mechanism be
implemented for reserving memory for a given channel and
that at least four buffer pages be dedicated to Indicate
Channel 0 (ICHNO). This is to ensure that FDDI-SMT frames
will not be dropped when there is a greal deal of activity on
the other Indicate Channels.

A 4 byte word must be allocated as the BSI device Mailbox.
This word is only used when accessing the BSI device
Pointer RAM Registers.
Space must also be allocated for buffering frames. Any buffers drawn from this space must be no larger than 4 kbytes
and may not cross a 4 kbyte boundary. At the current time
the Count (CND field in the PSP Descriptor is ignored by the
BSI device. Pool space is intended to be allocated in
4 kbyte pages.

5.0 SENDING FRAMES
This section describes how to use the BSI device to queue a
frame for transmission on an FDDI ring. It is assumed that
the BSI device has been initialized and that the Request
Configuration Registers (ROCR and R1 CR) and the Request
Expected Frame Status Registers (ROEFSR and R1 EFSR)
have been previously loaded with the desired values.

Space must be allocated for buffering ODU Descriptors
(ODUDs). As with frame data, buffers drawn from this space
must be no larger than 4 kbytes and may not cross a 4 kbyte
boundary.

The mechanism for sending a frame is as follows:
• Obtain space for data structures

4.2 Dedicated Buffer Pools

• Load the ODU(s)
• Process previous CNFs (optional)

To simplify memory management, buffer pages may be dedicated to individual PSP queues. When using dedicated buffers, the Indicate buffer management task becomes a matter
of:

• Build the ODUD(s)
• Build the REQ
• Signal the BSI device

• detecting page boundary crosses; as an indication that
the BSI device has finished filling the previous page
• obtaining confirmation that the host has finished proceSSing all frames in the previous page

4-102

Subsection 5.7 describes some special considerations for
sending multiple frames in a single request object.

be set to a value of 1; since, in this case, only a single frame
will be transmitted.

5.1 Obtain Space for Data Structures

The Confirmation Class (CNFClS) field defines the level of
request confirmation that the BSI device will use and should
be set as needed. To turn off request confirmation put a hex
value of Ox4 in the CNFClS field; although, the BSI device
will always generate CNF Descriptors whenever an exception is encountered. Please note that request processing will
halt for a given channel should that channel's CNF queue
become full. Thus, a provision for processing CNF Descriptors must be included in all applications; even those applications that do not wish to receive confirmation for most requests.
The Request Class (ROClS) field defines the class of the
request (i.e., asynchronous, synchronous, restricted token,
etc.). The FC field should be loaded with an appropriate
FDDI Frame Control value.

BSI device addressable memory must be obtained to:
• hold the frame data
• hold the ODU Descriptor(s)
• hold the Request Descriptor
It is the responsibility of the host software to manage space
for frame data and the ODUDs. Section 4, Memory Management Schemes, describes two simple memory allocation
methods. If multiple ODUDs are required, these must be
contiguously allocated in the form of an array of ODUDs.
Space for the Request Descriptor must be located within
the area designated as the Request queue (see Section
2.3). It must also be allocated in a serially contiguous fashion; immediately following the previously allocated descriptor. All BSI device queue pOinters "wrap" to the first location upon reaching the end of the queue area.
The frame data may need to be divided between multiple
ODUs. Each ODU may start anywhere within a 4k page, but
it must end at or before the next 4k boundary. Multiple
ODUs must be generated for frames over 4k in length.

When sending a single frame, both bits in the First and last
bits should be set; indicating that this is the only REO Descriptor in this request object. Finally, the address of the first
ODUD should be put into the laC field.
5.6 Signal the BSI Device about the Request
The BSI device may be caused to examine either of its REO
queues by writing to the corresponding Limit RAM Register
with a value that raises the limit to reference the new REO
Descriptor.

For each ODU, space must be allocated for a corresponding ODU Descriptor (ODUD). System configurations in
which the BSI device directly addresses host memory, may
be able to contrive ODU Descriptors (ODUDs) that refer directly to host specific memory buffers.

5.7 Sending Multiple Frames in a Single Request Object
The BSI device is capable of transmitting multiple frames in
a single service opportunity. This feature becomes important on a heavily loaded FDDI ring, with relatively infrequent
service opportunities. The BSI device can be caused to process multiple frames by:
o building an ODUD list that contains multiple frames

5.2 Process Confirmation Status Message Descriptors
(CNF)-Optional
When the BSI device processes a request it places confirmation messages in the CNF queue for that Request Channel. By examining these messages, the host may determine
when the BSI device has finished using ODU, ODUD and
REO queue space.
If the BSI device has been instructed to generate interrupts
after writing confirmation messages, then an autonomous
interrupt handler should be available to asynchronously process CNFs. Conversely, if these interrupts have been disabled, then CNFs should be processed when attempting to
send a frame.

• building a request object that contains multiple REO Descriptors or
o a combination of the above two methods.
The first method is extremely simple. Allocate and fill the
ODU buffers for all of the frames. Build multiple ODU Descriptor objects (demarcated by the First and last bits in
each ODUD) and concatenate the ODUDs together into one
array of descriptors. Build the REO Descriptor, as before,
except load the frame count into the SIZE field.

5.3 Copy Frame Data to Buffer
If the ODU buffers are distinct from the host specific memory buffers, copy the frame data from the host buffer(s) to the
ODU buffer(s).

The second method consists of a creating a REO Descriptor
marked as being "first", zero or more REO Descriptors
marked as "middle" descriptors and an ending REO Descriptor marked as being "last". The Limit RAM Register, for
the given request queue, must be set beyond the last REO
Descriptor. The parameter fields in first REO Descriptor are
used for the entire request object.

5.4 Build the ODU Descrlptor(s)
An ODU Descriptor (ODUD) must be written for each ODU.
The address and size of the ODU must be recorded in the
ODUD.lOC and ODUD.CNT fields, respectively.
When only a single ODUD is needed both the First and last
bits should be set (only). With multiple ODUDs the first
ODUD should has the just First bit set (first) and the last
ODUD should have the just last bit set (last). Any intervening ODUDs should have both bits cleared (middle).

5.8 Batching Single Frame Requests
On a heavily loaded FDDI ring service opportunities occur
less frequently than on an FDDI ring with only light traffic.
On a loaded network it makes sense to send multiple
frames per service opportunity. However, many network
communication systems send only a single frame at a time.
This subsection tells how one may use the capabilities of
the BSI device to batch single frame requests into a larger
request object.
The BSI device will only attempt to send a single request
object in any given service opportunity. A request object is
defined here to consist of one or more REO Descriptors
delimited using the First and last bits found inside each

5.5 Build the Request Descriptor
A Request Descriptor must be constructed which references the ODUD(s) that were just built.
The User Identification (UID) field may be assigned a host
defined value. This UID value will reemerge in one or more
CNFs and may be useful when processing a CNF (i.e., deallocating ODUD and buffer space). The SIZE field should

4-103

•

Interrupt Service Routine Logic (Optional)
if Open_Req = TRUE
generate empty REO. LAST
Open_Req = FALSE
Req_Size = 0
endif
Queue_Cnt is the number of queued request objects on
the request queue and is set to 0 queue initialization time.
Rell-Slze is the number of frames in the currently open
request object and is set to 0 at queue initialization time.
Open_Req is a boolean variable indicating the presence or
absence of an open request object and is set to FALSE at
queue initialization time. MalL-Req is a maximum number
of frames per request object defined by the host software.
Please note that the BSI device will not hold the token unnecessarily when processing an open request object. It will
only hold the token when explicitly instructed to do so, via
the ROCLS field in the Request Descriptor (REO).

descriptor. The BSI device interface software needs to build
different types of REQ Descriptors when queuing a frame
such that:
• A single frame request object is generated when the
queue is empty
• The resulting request object is limited to a maximum size
• Optionally the resulting request object is closed whenever a service opportunity is detected.
The following pseudo-code may be used to satisfy the
above requirements.
Transmit Logic
Rell-Size = Req_Size + 1
if Queued-Cnt = 0
mark as REQ.ONLY
Ope"--Req = FALSE
Queued_Cnt = 1
RE
• How to handle queue "wraps"
• How to detect boundary conditions (empty queue, full
queue)

• Each active Indicate Channel should have at least two
buffers placed on its PSP queue. With only one buffer,
the BSI device will immediately raise the Low Data Space
attention bit for that channel.
The host software must maintain its own pOinter and limit
variables for each queue. For REO and PSP queues, the
limit variable should reference the next available queue slot
for writing a new descriptor; while the pOinter variable
should correspond to the pointer variable on BSI device. For
CNF and lOUD queues, the software pointer should reference the next queue slot to be used when reading a new
descriptor. The software limit variable must always reflect
the limit variable on the BSI device. The software pointer
variable must be maintained independently from the BSI device queue pointer.

7.1 Queue Organization
A BSI device queue consists of a contiguous block of BSI
device addressable memory logically sub-divided into eight
byte queue slots. Oueues sized at 1 kbytes must be aligned
on 1 kbyte boundaries, while queues sized at 4 kbytes must
be aligned on 4 kbytes boundaries.
The BSI device embodies two indexing variables for each
queue: a pOinter to the next available queue position to
read or write (stored in BSI device Pointer RAM) and a
queue limit (stored in BSI device Limit RAM). The BSI device increments the pointer variable after reading from a
queue or writing to a queue. The host software may control
channel operation by manipulating the value of the limit variable. With this in mind there are a few simple rules governing queue manipulation by the BSI device.

To initialize queues that the BSI device writes (lOUD, CNF)
one must set the limit variable to reference the penultimate
available queue slot (required due to pipelining). For example, to make all but one of the queue slots available one
could set the pOinter variable to reference the first queue
slot and the limit variable to reference the "next to the next
to the last" queue slot. Also, one should clear the queue
area by overwriting it with binary zeroes; effectively marking
all queue slots as "null descriptors".
See Figure 5 for a pictorial description of initialized queues.
7.3 Queue "Wraps"
Upon reaching the end of the queue memory block, queue
indexing variables "wrap" to the beginning of the queue
memory block. The BSI device automatically performs
queue "wraps" for pointer variables; while the host software
must perform queue "wraps" for limit variables and software queue pointers. The method for calculating the next

6. Read operations are triggered by Limit RAM updates.
There are also some special considerations caused by the
pipe lined processing of CNF, lOUD and PSP Descriptors.
• The BSI device may generate two additional CNF/IDUD
Descriptors after detecting pointer/limit equality. It is
necessary to set the limit value such that it references
the penultimate available queue slot.
hardware/software

hardware/software

CNF

PSP

null

~

lOUD
null

null

null

null

null

null

null

null

null

null

null

null

null

null
null

nutl
null

~

o

7.2 Queue Initialization
To initialize queues that the BSI device reads (REO, PSP)
simply set the pointer (BSI device and software versions)
and software limit to reference the first queue slot. Do not
update the queue's Limit RAM Register until actually queuing the queue's first descriptor.

1. Pointer and limit variables reference a given queue slot by
pointing to the first word of the descriptor.
2. The pOinter variable always pOints to the next available
position on the queue.
3. The BSI device always increments the pointer variable
after a read or write operation.
4. The BSI device halts channel processing when the pointer and limit variables are logically equal.
5. The BSI device tests for pointer/limit equality during
queue read operations (REO, PSP) and after queue write
operations (lOUD, CNF). When detecting pointer/limit
equality during a read operation, the current read operation and no further read operations are made.

~

Z

cj

null

null

null

null

null

null

null

null

null

~

null
null
null

hardware/software

hardwa.re/software

TL/F/11088-5

FIGURE 5. Suggested Queue Initialization

4-107

II

queue position is dependent upon the form of data representation that the host software uses (i.e., BSI device addressable pOinters, queue byte offset, ... ). For example,
when representing the limit variable as a queue offset one
could use simple modulo arithmetic. When the limit variable
is maintained as a pointer into BSI device addressable
memory the host software might use the following method
to increment the variable (specified with C code using
4 kbyte queues).
new = «old + 8)& Oxfff) + (old & OxOffffOOO)
7.4 Detecting Boundary Conditions
The BSI device detects both queue empty (when reading)
and queue full conditions (when writing) by testing for pointer/limit variable equality. As noted above, this test is done
during read operations and after write operations.

REQ/PSP
Queue

When reading, a queue empty condition cannot be determined by comparing the pointer and limit variables. Instead
the host software may recognize the presence of a "null
descriptor" on the queue. To ensure that there will always
be at least one "null descriptor" to demarcate the queue
empty condition; the host software must never set the limit
variable to indicate that all of the queue slots are available
and must mark each available queue slot as a "null description" (binary zeroes are recommended).
The host software can detect a queue full condition using
the same basic mechanism as the BSI device. When writing,
a queue may be considered full when the software limit
pointer references the queue slot immediately "before" the
slot referenced by the software pOinter variable. Queue
"wraps" must be taken into account in the queue variable
arithmetic.
See Figure 6 for a graphical representation of the various
queue boundary conditions.

REQ/PSP
Queue

CNF/IDUD
Queue

CNF/IDUD
Queue

null
null
null

851 device sees
Empty Queue

null

O.Req

null

F.Req

null

null

null

null

null

null

oS

Host sees
Full Queue

Host sees
Empty Queue

null

aSI device sees
Full Queue

TLlF/11088-6

FIGURE 6. Queue Boundary Conditions

4-108

Layout Recommendations
for a System Using
National's FOOl Chip Set

National Semiconductor
Application Note 674
Bruce Wolfson

This application note covers basic PCB layout recommen·
dations and design techniques for high speed signal distri·
bution in National's FDDI system. Due to the high signal
speeds in FDDI, proper layout is critical. Many digital design·
ers are not aware of problems that can arise in a high speed
system from improper routing, incorrect termination, and
poor power and ground layout.

the differential ECl signals. In National's FDDI chip set
these include the following:
• 125 MHz and 12.5 MHz ECl clocks from the DP83241
(CDDTM device)
• Receive Data and Receive Clock from the DP83231
(CRDTM device)
• Data to and from the fiber optic transceiver, and

ROUTING
Line reflections are a reflection of the signal waveform in a
transmission line. They are caused by a difference in imped·
ance between the transmission line and the load at the end
of the line. If the line propagation delay is small compared to
the rise time of the signal, the reflection is hidden during the
rise time and is not seen as overshoot or ringing. However
with the fast edge rates of the signals in a FDDI system, the
line length becomes critical. The distortion that results from
reflections can give false triggering or data errors. The sig.
nals most susceptible to reflections in a FDDI system are

o

DP83251/55

• loopback data from the DP83251 155 (PLAYERTM
device)
It is imperative that these signal lines be kept as short as
possible. To achieve this, the DP83241 should be placed
close to the DP83251 155, the DP83231 should be placed
close to the fiber optic receiver and the DP83251/55, and
the fiber optiC transmitter should be placed close to the
DP83251/55 (Figures 1 and 2). The pinout of the
PLAYER device determines the placement of the CDD and
CRD devices. All the ECl signals that travel between these
devices line up perfectly. To keep the ECl signals traveling
between these three devices as short as possible, the CDD
and CRD devices should be oriented with pin 1 facing the

TBC :I:

~

TBC :I:

TXC :I:

~

TXC :I:

o

DP83241

TXD :I:

...

LBO :I:

RXD :I:

~

RXC :I:

~

FOTX

LBO :I:
RXD :I:

o

DP83231

RXC :I:
DATA :I:

...

FORX
TL/F/10790-1

FIGURE 1. Recommended Component Placement for a Single Attach Station (SAS)

4-109

o

DP83251/55

TBC :I:

+-

TXC:I:

.-

TXD :I:

•

LBO :I:

rOTX

LBO :I:
RXD :I:

RXD :I:

RXC :I:

RXC :I: .

o

DP83231
DATA :I:

•

rORX

TBC :I:

o

DP83241'

TXC :I:

TBC :I:

TXC :I:

o

DP83251/55

.- t.-

TXD :I:

...

LBO :I:

rOTX

LBO :I:
RXD :I:

RXD :I:

RXC :I:

RXC :I:

o

DP83231
DATA :I:

•

FORX
TLlF/l0790-2

'See DP83241 Datasheet for driving multiple DP83251 155 devices.

FIGURE 2. Recommended Component Placement for a Dual Attach Station (DAS)

4-110

PLAYER device. In addition, the PLAYER device must have
its ECl signals facing toward the fiber optic transceiver.

but the orientation was chosen to allow an easy connection
to the system interface, the control logic and the PLAYER
device. Since the system interface logic is on the end of the
board opposite the fiber optic transceiver, it was logical to
have these signals facing that end of the board. It also allowed the control signals of the BMAC device to be near the
control signals of the PLAYER device. All the TTL signals in
this design can be autorouted. However, none of these signals should pass through the CDD or CRD device circuitry
areas to avoid the possibility of noise due to crosstalk. In a
Dual Attach Station (DAS) or a Concentrator design, the
CRD device should still be placed as close as possible to
the PLAYER device but the one CDD device responsible for
clocking all the PLAYER and BMAC devices should be
placed so as to minimize the skews between each PHY
layer. More information regarding the CDD device driving
multiple PLAYER devices can be found in the DP83241 datashee!.

A Single Attach Station (SAS) in an AT form factor was
chosen to demonstrate recommended chip placement and
signal routing. Figures 3 through 7 show the basic connections between National's FDDI chips in a Single Attach Station. The silkscreen showing chip and component placement is shown in Figure 8 and the actual signal traces are
shown in Figure 9. The FOTX and FORX placement is set
by the PMD specification. The CDD, CRD and PLAYER devices should be placed as described in the previous paragraph. However, due to the constraints of the AT form factor, it is necessary to rotate the CDD device and its external
components 90 degrees counter clockwise. The only remaining chip to be placed was the DP83261, BMACTM device. Once again the form factor determined the placement,

CONTROL BUS

CONTROL DATA
CONTROL ADDRESS

1

CONTROL SIGNALS

~
TXD :!:

FOTX

TXE
MAC INDICATE

PHY INDICATE

lBD :!:

BMAC

!

PLAYER

MAC REQUEST

PHY REQUEST

DATA :!:

RXC :!:
RXD :!:

CRO

SO :!:

FORX

TTlSD

LSC

I

LBC

ClK DEl

I

CRD CONTROL SIGNALS
L---

I--

COO

TXC:!:

TBC :!:

TL/F/10790-3

FIGURE 3. Basic Block Diagram of a Single Attach Station Using National's FOOl Chips

4-111

~
,....
CD
Z•

To BMAC
device

900n



z

APPENDIX A
ECl DESIGN GUIDE:
TRANSMISSION liNE CONCEPTS

CD
..,.
.,..
I

(eq.3)
Lo = IlZo
II
(eq.4)
Co=Zo
More formal treatments of transmission line characteristics,
including loss effects, are available from many sources. 1- 3

INTRODUCTION
The interactions between wiring and circuitry in high-speed
systems are more easily determined by treating the interconnections as transmission lines. A brief review of basic
concepts is presented and simplified methods of analysis
are used to examine situations commonly encountered in
digital systems. Since the principles and methods apply to
any type of logic circuit, normalized pulse amplitudes are
used in sample waveforms and calculations.

TERMINATION AND REFLECTION
A transmission line with a terminating resistor is shown in
Figure t. As indicated, a positive step function voltage travels from left to right. To keep track of reflection polarities, it
is convenient to consider the lower conductor as the voltage
reference and to think in terms of current flow in the top
conductor only. The generator is assumed to have zero internal impedance. The initial current 11 is determined by V1
and Zoo

SIMPLIFYING ASSUMPTIONS
For the great majority of interconnections in digital systems,
the resistance of the conductors is much less than the input
and output resistance of the circuits. Similarly, the insulating
materials have very good dielectric properties. These circumstances allow such factors as attenuation, phase distortion, and bandwidth limitations to be ignored. With these
simplifications, interconnections can be dealt with in terms
of characteristic impedance and propagation delay.

V1,h ---..

,.~

CHARACTERISTIC IMPEDANCE
The two conductors that interconnect a pair of circuits have
distributed series inductance and distributed capacitance
between them, and thus constitute a transmission line.
For any length in which these distributed parameters are
constant, the pair of conductors have a characteristic impedance Zoo Whereas quiescent conditions on the line are
determined by the circuits and terminations, Zo is the ratio
of transient voltage to transient current passing by a point
on the line when a signal charge or other electrical disturbance occurs. The relationship between transient voltage,
transient current, characteristic impedance, and the distributed parameters is expressed as follows:

~=

Zo =

I

[CO
'iCc

1.=.'2

zo

--v~1 l)
I,

RT

DELAV=T= lb
TL/F/l0790-14

FIGURE 1. Assigned Polarities and
Directions for Determining Reflections
If the terminating resistor matches the line impedance, the
ratio of voltage to current traveling along the line is matched
by the ratio of voltage to current which must, by Ohm's law,
always prevail at RT. From the viewpoint of the voltage step
generator, no adjustment of output current is ever required;
the situation is as though the transmission line never existed
and RT had been connected directly across the terminals of
the generator. From the RT viewpoint, the only thing the line
did was delay the arrival of the voltage step by the amount
of time T.
When RT is not equal to Zo, the initial current starting down
the line is still determined by V1 and Zo but the final steady
state current, after all reflections have died out, is determined by V1 and RT (ohmic resistance of the line is assumed to be negligible). The ratio of voltage to current in the
initial wave is not equal to the ratio of voltage to current
demanded by RT. Therefore, at the instant the initial wave
arrives at RT, another voltage and current wave must be
generated so that Ohm's law is satisfied at the lineload interface. This reflected wave, indicated by Vr and Ir in
Figure t, starts to return toward the generator. Applying

(eq.1)

PROPAGATION VELOCITY
Propagation velocity v and its reciprocal, delay per unit
length II, can also be expressed in terms of Lo and Co. A
consistent set of units is nanoseconds, microhenries and
picofarads, with a common unit of length.
II = ~LoCo

v,

LINE LENGTH = I

where La = inductance per unit length, Co = capacitance
per unit length. Zo is in ohms, Lo in Henries, Co in Farads.

1
v = ~LoCo

-

1._

(eq.2)

Equations t and 2 provide a convenient means of determining the La and Co, of a line when delay, length and impedance are known. For a length I and delay T, II is the ratio TIl.
To determine Lo and Co, combine Equations t and 2.

4-117

greater than ZOo In turn, this means that the initial current I,
is larger than the final quiescent current, dictated by V, and
RT. Hence, Ir must oppose I, to reduce the line current to
the final'quiescent value. Similar reasoning shows that if V,
is negative, I, flows in the same direction as I,.

Kirchoff's laws to the end of the line at the instant the initial
wave arrives, results in the following.
I, + I, = IT = current into RT
(eq. 5)
Since only one voltage can exist at the end of the line at this
instant of time, the following is true:
V, + V, = VT
VT
V, + V,
IT = RT = ~

thus

V,

It is sometimes easier to determine the effect of Vr on line
conditions by thinking of it as an independent voltage generator in series with RT. With this concept, the direction of I, is
immediately apparent; its magnitude, however, is the ratio of
V, to Zo, i.e., RT is already accounted for in the magnitude of
V,. The relationships between incident and reflected Signals
are represented in Figure 2 for both cases of mismatch between RT and Zoo
The incident wave is shown in Figure 2a, before it has
reached the end of the line. In Figure 2b, a positive V, is
returning to the generator. To the left of V, the current is still
I" flowing to the right, while to the right of V, the net current
in the line is the difference between I, and I,. In Figure 2c,
the reflection coefficient is negative, producing a negative
V,. This, in turn, causes an increase in the amount of current
flowing to the right behind the V, wave.

(eq. 6)

V,

I, = - and I, = - Zo
Zo
with the minus sign indicating that V" is moving toward the
generator.
Combining the foregoing relationships algebraically and
solving for V, yields a simplified expression in terms of V"
Zo and RT.
also

V, _ V, = V, + V, = V, + V,
Zo
Zo
RT
RT
RT

V,

(2. - ...!.-)
Zo

RT

=

V,

(...!.+ 2.)
RT
Zo

(eq.7)

~II--__

V, = V, (RT - Zo) = PL V,
RT + Zo
The term in parenthesis is called the coefficient of reflection
p. With RT ranging between zero (shorted line) and infinity
(open line), the coefficient ranges between -1 and + 1 respectively. The subscript L indicates that P refers to the
coefficient at the load end of the line.
Equation 7 expresses the amount of voltage sent back
down the line, and since
VT = V, + V,
(eq.8)

I Zo

(eq.9)

The foregoing has the same form as a simple voltage divider involving a generator V, with internal impedance Zo driving a load RT, except that the amplitude of VT is doubled.
The arrow indicating the direction of V, in Figure 1 correctly
indicates the V, direction of travel, but the direction of I, flow
depends on the V, polarity. If V, is positive, I, flows toward
the generator, opposing I,. This relationship between the
polarity of V, and the direction of I, can be deduced by noting in Equation 7 that if V, is positive it is because RT is

TL/F/l0790-17

c. Reflected Wave for Rr < Zo
FIGURE 2. Reflections for Rr Zo

'*

4-118

SOURCE IMPEDANCE, MULTIPLE REFLECTIONS

ducing Rs (Figure 3) to 130. increases Ps to -0.75V, and
the effects are illustrated in Figure 4. The initial value of VT
is 1.BV with a reflection of 0.9V from the open end. When
this reflection reaches the source, a reflection of 0.9V x
-0.75V starts back toward the open end. Thus, the second
increment of voltage arriving at the open end is negative
going. In turn, a negative-going reflection of 0.9V x -0.75V
starts back toward the source. This negative increment is
again multiplied by -0.75 at the source and returned
toward the open end. It can be deduced that the difference
in amplitude between the first two positive peaks observed
at the open end is

When a reflected voltage arrives back at the source (generator), the reflection coefficient at the source determines the
response to Yr. The coefficient of reflection at the source is
governed by Zo and the source resistance Rs.
Rs - Zo
Ps = Rs + 20

(eq.10)

If the source impedance matches the line impedance, a reflected voltage arriving at the source is not reflected back
toward the load end. Voltage and current on the line are
stable with the following values.

PU V1 - (1 + PU V1 p2L p 2s
(eq.12)
PU V1 (1 - p2L p 2sl.
The factor (1 - p2L p 2s) is similar to the damping factor
associated with lumped constant circuitry. It expresses the
attenuation of successive positive or negative peaks of ringing.

(eq.11)

VT - V'T = (1
= (1

If neither source impedance nor terminating impedance
matches Zo, multiple reflections occur; the voltage at each
end of the line comes closer to the final steady state value
with each succeeding reflection. An example of a line mismatched on both ends is shown in Figure 3. The source is a
step function of 1V amplitude occurring at time to. The initial
value of V1 starting down the line is 0.75V due to the voltage divider action of 20 and Rs. The time scale in the photograph shows that the line delay is approximately 6 ns. Since
neither end of the line is terminated in its characteristic impedance, multiple reflections occur.

+
+

-

The amplitude and persistence of the ringing shown in Figure 3 become greater with increasing mismatch between
the line impedance and source and load impedances. Re-

Vr

- v,

Zo=930

RT= co

1

VT
H =20 nsldiv
V=0.4 V/div

TL/F/l0790-1B

31 - 93
+ 93 = -0.5

PS = 31
I ..

mtlally:

v,

TL/F/l0790-20

"" - 93
PL=""+93=+1

FIGURE 4. Extended Ringing when Rs
of Figure 31s Reduced to 130.

Zo
93
= Zo + Rs • Vo = 124'1 = 0.7SV

LATTICE DIAGRAM
In the presence of multiple reflections, keeping track of the
incremental waves on the line and the net voltage at the
ends becomes a bookkeeping chore. A convenient and systematic method of indicating the conditions which combines
magnitude, polarity and time utilizes a graphic construction
called a lattice diagram.4 A lattice diagram for the line conditions of Figure 3 is shown in Figure 5.
The vertical lines symbolize discontinuity pOints, in this case
the ends of the line. A time scale is marked off on each line
in increments of 2T, starting at to for V1 and T for VT. The
diagonal lines indicate the incremental voltages traveling
between the ends of the line; solid lines are used for positive voltages and dashed lines for negative. It is helpful to
write the reflection and transmission multipliers p and
(1 + p) at each vertical line, and to tabulate the incremental
and net voltages in columns alongside the vertical lines.
Both the lattice diagram and the waveform photograph
show that VI and VT asymptotically approach 1V, as they
must with a 1V source driving an open-ended line.

Vr

v,

H =20 ns/div
V =0.5 V/div
TL/F/l0790-19

FIGURE 3. Multiple Reflections Due to
Mismatch at Load and Source

4-119

.

l>
Z

en
.....
-'="

~

r---------------------------------------------------------------------------

CD

- -

VT

V,

Z
c(
SUM:

:+0.76 V

+ 0.375 V
+1.125V

~
+0.937V

- P=+1

p= -0.5

(Hp)- +0.6

1=10

(1 +p)_

+2
SUM:

T

+1.60V

3T

-0.75 V
+0.75 V

5T

+0.375 V
+ 1.125 V

7T

~::~:;:

9T

+0.094 V
+1.031 V

2T

4T

+ 0.094 V
+1.031 V

8T

-0.047 V
+ G.984 V

8T

TLlF/l0790-21

FIGURE 5. lattice Diagram for the Circuit of Figure 3
SHORTED LINE
The open-ended line in Figure 3 has a reflection coefficient
of + 1 and the successive reflections tend toward the
steady state conditions of zero line current and a line voltage equal to the source voltage. In contrast, a shorted line
has a reflection coefficient of -1 and successive reflections
must cause the line conditions to approach the steady state
conditions of zero voltage and a line current determined by
the source voltage and resistance.
Shorted line conditions are shown in Figure 6a with the reflection coefficient at the source end of the line also negative. A negative coefficient at both ends of the line means
that any voltage approaching either end of the line is reflected in the opposite polarity. Figure 6b shows the response to
an input step-function with a duration much longer than the

line delay. The initial voltage starting down the line is about
+ 0.75V, which is inverted at the shorted end and returned
toward the source as -0.75V. Arriving back at the source
end of the line, this voltage is multiplied by (1 + ps), causing a -0.37V net change in V1. Concurrently, a reflected
voltage of +0.37V (-0.75V times Ps of -0.5) starts back
toward the shorted end of the line. The voltage at V 1 is
reduced by 50% with each successive round trip of reflections, thus leading to the final condition of zero volts on the
line.
When the duration of the input pulse is less than the delay
of the line, the reflections observed at the source end of the
line constitute a train of negative pulses, as shown in Figure
6e. The amplitude decreases by 50% with each successive
occurrence as it did in Figure 6b.

TLlF/l0790-99

0-93
PL ~ 0 + 93 ~ -1

PS ~ -0.5

a. Reflection Coefficients for Shorted Line

v,
v,
H = 10nsldiv
V=O.2 V/dlv

H= 10 ns/div
V=O.2 V/dlv

TLlF/l0790-23

TL/F110790-22

b. Input Pulse Duration

> Line Delay

c. Input Pulse Duration

FIGURE 6. Reflections of Long and Short Pulses on a Shorted Line

4-120

< Line Delay

EXTRA DELAY WITH TERMINATION
CAPACITANCE
DeSigners should consider the effect of the load capacitance at the end of the line when using series termination.
Figure 9 shows how the output waveform changes with increasing load capacitance. Figure 9b shows the effect of
load capacitances of 0, 12, 24, 48 pF. With no load, the
delay between the 50% pOints of the input and output is just
the line delay T. A capacitive load at the end of the line
causes an extra delay I!o.T due to the increase in rise time of
the output signal. The midpoint of the output is used as a
criterion because the propagation delay of an ECl circuit is
measured between the 50% points of the input and output
signals.

SERIES TERMINATION
Driving an open-ended line through a source resistance
equal to the line impedance is called series termination. It is
particularly useful when transmitting signals which originate
on a PC board and travel through the backplane to another
board, with the attendant discontinuities, since reflections
coming back to the source are absorbed and ringing thereby
controlled. Agure 1 shows a 930 line driven from a 1V generator through a source impedance of 930. The photograph
illustrates that the amplitude of the initial signal sent down
the line is only half of the generator voltage, while the voltage at the open end of the line is doubled to full amplitude
(1 + PL = 2). The reflected voltage arriving back at the
source raises VItO the full amplitude of the generator signal. Since the reflection coefficient at the source is zero, no
further changes occur and the line voltage is equal to the
generator voltage. Because the initial signal on the line is
only half the normal signal swing, the loads must be connected at or near the end of the line to avoid receiving a 2step input signal.
An ECL output driving a series terminated line requires a
pull-down resistor to VEE, as indicated in Figure 8. The resistor Ro shown in Figure 8 symbolizes the output resistance of the EeL gate. The relationships between Ro, RS, RE
and Zo are discussed in Appendix B.

TUF/l0790-27

a. Series Terminated line with load Capacitance

TUF/l0790-24

HI::1 ns/div
V=O.2 Vldlv

TL/F/l0790-28

b. Output Rise Time Increase with
Increasing load Capacitance

O%
~

LINE

INPUT

LINE
OUTPUT

H=1D nsldiv

V=O.4V/dlv

TLlF/l0790-29

TUF/l0790-25

c. Extra Delay I!o. T Due to Rise Time Increase

FIGURE 7. Series Terminated line and Waveforms
AS

T

FIGURE 9. Extra Delay with Termination Capacitance

Zo

TUF/l0790-26

FIGURE 8. ECl Element Driving
a Series Terminated line

4-121

~

"'CD

:Z
c(

r-------------------------------------------------------------------------------~

V~N (I)

The increase in propagation delay can be calculated by using a ramp approximation for the incident voltage and characterizing the circuit as a fixed impedance in series with the
load capacitance, as shown in Figure 10. One general solution serves both series and parallel termination cases by
using an impedance Z' and a time constant T, defined in
Figure 10a and 10b. Calculated and observed increases in
delay time to the 50% point show close agreement when T
is less than half the ramp time. At large ratios of Tla (where
a = ramp time), measured delays exceed calculated values
by approximately 7%. Figure 11, based on measured values, shows the increase in delay to the 50% point as a
function of the Z'C time constant, both normalized to the
10% to 90% rise time of the input signal. As an example of
using the graph, consider a 1oon series terminated line with
30 pF load capacitance at the end of the line and a no-load
rise time of 3 ns for the input signal. From Figure 10a, Z' is
equal to 100n; the ratio Z'Clt, is 1. From the graph, the
ratio AT It, is 0.8. Thus the increase in the delay to the 50%
point of the output waveform is 0.8 t" or 2.4 ns, which is
then added to the no-load line delay T to determine the total
delay.
Had the 100n line in the foregoing example been parallel
rather than series terminated at the end of the line, Z' would
be 50n. The added delay would be only 1.35 ns with the
same 30 pF loading at the end. The added delay would be
only 0.75 ns if the line were 50n and parallel terminaled.
The various trade-offs involving type of termination, line impedance, and loading are important considerations for crilical delay paths.

-_zo'---l""

r

TLlF/10790-30

a. Thevenln Equivalent for
Series Terminated Case

z'=~

Zo

2

V'N ( I ) l 1
C

1,.-1'-...

VIN(I)~·i
C

RT=Zo~

~

T=Z'C=ZoC

2

~

I

Vo

~

TLlF/l0790-31

b. Thevenin Equivalent for
Parallel Terminated Case

v
1,=0.88
8=1.251,

I

1=0

1=8
TLlFI1 0790-32

Vin(t) =

a[tu(t) V

Ofor I <
u(t) = 1 for t >

(t - a)u (I - a))

a
a

2.5

~I

u(t - a) = Ofort < a,
1forl>a

N

V

:e
"
a:

1.5

z

iii

en
~
a:

T(1 - e- tlT )) u(t)

1.0

V

u

~

5w

V
--[(I-a)

a

0.5

0

!.=.!

o

/'

/

0

V
1
Vc(S) = - .
(1 - e- as)
ar s2(s+1/T)

aV [I -

7

::i

VIN(S) = as2 (1 - e- as)

vc(t) =

2.0

0

W

/

./

/

1/

0.5
1.0
1.5
2.0
2.5
LINE·LOAD TIME CONSTANT, NORMALlZED-Z'CIt,

- T(1 - e)1 u (I - a)
c. Equations for Input and Output Voltages
T

TLlF110790-33

FIGURE 11. Increase in 50% Point Delay Due
to Capacitive Loading at the End
of the Line, Normalized to T r

FIGURE 10. Determining the Effect
of End-of-Line Capacitance

4-122

DISTRIBUTED LOADING EFFECTS ON
LINE CHARACTERISTICS

This analogy is strengthened by observing the effect of reducing RT from 930 to 750, which leads to the middle
waveform of Figure 12c. Note that the final (steady state)
value of the line voltage is reduced by about the same
amount as that caused by the capacitive reflections. In the
lower trace of Figure 12c the source resistance Rs is reduced from 930 to 750, restoring both the initial and final
line voltage values to the same amplitude as the final value
in the upper trace. From the standpoint of providing a desired signal voltage on the line and impedance matching at
either end, the effect of distributed capacitive loading can
be treated as a reduction in line impedance.
The reduced line impedance can be calculated by considering the load capacitance CL as an increase in the intrinsic
line capacitance Co along that portion of the line where the
loads are connected. 6 Denoting this length of line as I, the
distributed value Co of the load capacitance is as follows.

When capacitive loads such as ECL inputs are connected
along a transmission line, each one causes a reflection with
a polarity opposite to that of the incident wave. Reflections
from two adjacent loads tend to overlap if the time required
for the incident wave to travel from one load to the next is
equal to or less than the signal rise time. s Figure 12a illustrates an arrangement for observing the effects of capacitive loading, while Figure 12b shows an incident wave followed by reflections from two capacitive loads. The two capacitors causing the reflections are separated by a distance
requiring a travel time of 1 ns. The two reflections return to
the source 2 ns apart, since it takes 1 ns longer for the
incident wave to reach the second capacitor and an additional 1 ns for the second reflection to travel back to the
source. In the upper trace of Figure 12b, the input signal rise
time is 1 ns and there are two distinct reflections, although
the trailing edge of the first overlaps the leading edge of the
second. The input rise time is longer in the middle trace,
causing a greater overlap. In the lower trace, the 2 ns input
rise time causes the two reflections to merge and appear as
a single reflection which is relatively constant (at ::::: -10%)
for half its duration. This is about the same reflection that
would occur if the 930 line had a middle section with an
impedance reduced to 750.
With a number of capacitors distributed all along the line of
Figure 12a, the combined reflections modify the observed
input waveform as shown in the top trace of Figure 12c. The
reflections persist for a time equal to the 2-way line delay
(15 ns), after which the line voltage attains its final value.
The waveform suggests a line terminated with a resistance
greater than its characteristic impedance (RT > Zo).
RS=93Q

Co is then added to Co in Equation
duced line impedance Zoo
Z'

-

{TO _~

o - ,,~ -

Co (

1 to determine the re-

Lo

CD)
1+Co

(eq.13)

fCO

Z'

+

VCo

=

Zo

°RH
1 +....Q

Co

1 +....Q

Co

Zo=93Q

I
Vo
2V

I

.1.

! I

TLlF/l0790-34

a. Arrangement for Observing Capacitive Loading Effects

.. Rs=Rl=
93 ~!
Rs=93~!

+-Rr=7Stl
.. Rs=RT=
75 n

H=2ns/div
V = 0.25 V/div

H =5nsldlv
V =0.25 V/dlv

TL/F/l0790-35

TL/F/l0790-36

b. Capacitive Reflections Merging
as Rise Time Increases

c. Matching the Altered Impedance
of a Capacitively Loaded Line

FIGURE 12. Capacitive Reflections and Effects on Line Characteristics

4-123

•

.... ,---------------------------------------------------------------------------------,
In the example of Figure 12c, the total load capacitance is
MISMATCHED LINES
~

~

z
cc

33 pF while the total intrinsic line capacitance lCo is 60 pF.
(Note that the ratio ColCo is the same as Cll/CO.) The
calculated value of the reduced impedance is thus
93
93
Z'o = g 3 = ff.55 = 750
(eq.14)
1+60
This correlates with the results observed in Figure 12c when
RT and Rs are reduced to 750.
The distributed load capacitance also increases the line delay, which can be calculated from Equation 2.

8' =

~Lo(Co + Co) = ~LoCo~1 + ~~

Reflections occur not only from mismatched load and
source impedances but also from changes in line impedance. These changes could be caused by bends in coaxial
cable, unshielded twisted-pair in contact with metal, or mismatch between PC board traces and backplane wiring. With
the coax or twisted-pair, line impedance changes run about
5% to 10% and reflections are usually no problem since the
percent reflection is roughly half the percent change in impedance. However, between PC board and backplane wiring, the mismatch can be 2 or 3 to 1. This is illustrated in
Figure 14 and analyzed in the lattice diagram of Figure 15.
Line 1 is driven in the series terminated mode so that reflections coming back to the source are absorbed.
The reflection and transmission at the pOint where impedances differ are determined by treating the downstream line
as though it were a terminating resistor. For the example of
Figure 14, the reflection coefficient at the intersection of
lines 1 and 2 for a signal traveling to the right is as follows.
Z2 - ZI
93 - 50
P12 = - - - - - = - - = +0.3
(eq.18)
Z2 + ZI
143
Thus the signal reflected back toward the source and the
signal continuing along line 2 are, respectively, as follows.

(eq.15)

=8~1 + CD

Co
The line used in the example of Figure 12c has an intrinsic
delay of 6 ns and a loaded delay of 7.5 ns which checks
with Equation 15.

18'

=

18 ff.55

= 6

ff.55 =

7.5 ns

(eq.16)

Equation 15 can be used to predict the delay for a given line

and load. The ratio ColCo (hence the loading effect) can be
minimized for a given loading by using a line with a high
intrinsic capacitance Co.
A plot of Z' and 8' for a 500 line as a function of CD is
shown in Figure 13. This figure illustrates that relatively
modest amounts of load capacitance will add appreciably to
the propagation delay of a line. In addition, the characteristic impedance is reduced significantly.
8

~

\

/

/'

L.J=-"V

V

Vlr= P12Vl = +0.3Vl
(eq.19a)
V2 = (1 + P12) VI = + 1.3 VI
(eq.19b)
At the intersection of lines 2 and 3, the reflection coefficient
for signals traveling to the right is determined by treating Za
as a terminating resistor.
Za-Z239-93
P23 = - - - - - = - - = -0.41
(eq.20)
Za + Z2
132
When V2 arrives at this pOint, the reflected and transmitted
signals are as follows.

80

co
I

50i

V2r = P23 V2= -0.41 V2
= (-0.41) (1.3) VI
= -0.53Vl

6' =1.778n8l11
CD=2.8pFlin 40~

"!

/

()

~ r-....

10

-

30
20

V3 = (1 + P2a) V2 = 0.59 V2
= (0.59)(1.3) VI
(eq.21b)
= 0.77 VI
Voltage V3 is doubled in magnitude when it arrives at the
open-ended output, since Pl is + 1. This effectively cancels
the voltage divider action between Rs and ZI.

~

~

II:

:l!

ZD'

20

iii

()

10 I

~

o

V4 = (1 + pu V3 = (1 + Pu (1 + P2a) V2
= (1 + pu (1 + P23)(1 + P12) VI

30

CD- DISTRIBUTED CAPACITANCE- pFlln

(eq.22)

Vo
= (1 + pu (1 + P23)(1 + P1V"2

TL/F/l0790-37

FIGURE 13. Capacitive Loading
Effects on Line Delay and Impedance
Worst case reflections from a capacitively loaded section of
transmission line can be accurately predicted by using the
modified impedance of Equation 9. 6 When a signal originates on an unloaded section of line, the effective reflection
coefficient is as follows.
Z'o - Zo
P = Z'o + Zo

(eq.21a)

V4 = (1 + P23) (1 + P12) Vo
Thus, Equation 22 is the general expression for the initial
step of output voltage for three lines when the input is series
terminated and the output is open-ended.

(eq.17)

4-124

Note that the reflection coefficients at the intersections of
lines 1 and 2 and lines 2 and 3 in Figure 15 have reversed
signs for signals traveling to the left. Thus the voltage reflected from the open output and the signal reflecting back
and forth on line 2 both contribute additional increments of
output voltage in the same polarity as Vo. Lines 2 and 3
have the same delay time; therefore, the two aforementioned increments arrive at the output simultaneously at
time 5T on the lattice diagram (Figure 15).
In the general case of series lines with different delay times,
the vertical lines on the lattice diagram should be spaced
apart in the ratio of the respective delays. Figure 16 shows
this for a hypothetical case with delay ratios 1:2:3. For a
sequence of transmission lines with the highest impedRs=500

ance line in the middle, at least three output voltage increments with the same polarity as Vo occur before one can
occur of opposite polarity. On the other hand, if the middle
line has the lowest impedance, the polarity of the second
increment of output voltage is the opposite of Vo. The third
increment of output voltage has the opposite polarity, for
the time delay ratios of Figure 16.
When transmitting logic signals, it is important that the initial
step of line output voltage pass through the threshold region
of the receiving circuit, and that the next two increments of
output voltage augment the initial step. Thus in a series terminated sequence of three mismatched lines, the middle
line should have the highest impedance.

Z,=500

Z,=930

z.,=390

;-~~~~--------~~----------.-----------.. ~==

Ps=o

P12= +0.3
P21= -0.3

P23= -0.41

P32= +0.41
TL/F/l0790-38

H = 2Ons/div

V=0.4 Vldl.

TUF/l0790-39

FIGURE 14_ Reflections from Mismatched Lines

v,

+ 0.50 V

1=0

~
+ 0.55 V

T

P12=+O.3

V3
P23= -0.41

P21

P32= +0.41

V.

p=O

= -0.3

--

V.
PL=1 (1+PLl= +2

2T
+0.77 V

3T
-0.19V
+0.46 V

4T
+O.40Y

5T
+D.35V
+D.8IV

+1.17V

5T

7T
+0.24 V

IT.1"5V

6T
-0.12V
+1.05V

9T

ETC.

TLlF/l0790-40

FIGURE 15_ Lattice Diagram for the Circuit of Figure 14

4-125

•

v~ Tl_.+r•.--T2--...,. .Vt-i'._----T3-----i.~y
taO

...TL/F/l0790-41

FIGURE 16. Lattice Diagram for Three Lines with Delay Ratios 1:2:3
RISE TIME VERSUS LINE DELAY
When the 2-way line delay is less than the rise time of the
input wave, any reflections generated at the end of the line
are returned to the source before the input transition is completed. Assuming that the generator has a finite source resistance, the reflected wave adds algebraically to the input
wave while it is still in transition, thereby changing the shape
of the input. This effect is illustrated in Figure 11, which
shows input and output voltages for several comparative
values of rise time and line delay.
In Figure 11b where the rise time is much shorter than the
line delay, VI rises to an initial value of 1V. At time T later,
VT rises to 0.5V, i.e., 1 + PL = 0.5. The negative reflection
arrives back at the source at time 2T, causing a net change
of -0.4V, i.e., (1 + psI (-0.5) = -0.4.

The net input voltage at any particular time is determined by
adding the reflection to the otherwise unaffected input. It
must be remembered that the reflection arriving back at the
input at a given time is proportional to the input voltage at a
time 2T earlier. The value of V 1 in Figure 11d can be calculated by starting with the 1V input ramp.

1
VI = -et forO"; t ,,;4T

t,

=

1V

~

fort

(eq.23)

4T

The reflection from the end of the line is
V - pdt - 2T).

,-

t,

(eq.24)

'

the portion of the reflection that appears at the input is

The negative coefficient at the source changes the polarity
of the other 0.1 V of the reflection and returns it to the end of
the line, causing VT to go positive by another 50 mV at time
3T. The remaining 50 mV is inverted and reflected back to
the source, where its effect is barely distinguishable as a
small negative change at time 4T.
In Figure 11c, the input rise time (0% to 100%) is increased
to such an extent that the input ramp ends just as the negative reflection arrives back at the source end. Thus the input
rise time is equal to 2T.
The input rise time is increased to 4T in Figure 11d, with the
negative reflection causing a noticeable change in input
slope at about its midpoint. This change in slope is more
visible in the double exposure photo of Figure 11e, which
shows VI (t, still set for 4T) with and without the negative
reflection. The reflection was eliminated by terminating the
line in its characteristic impedance.

V' = (1 + psI pdt - 2T).
,
t,'

(eq.25)

the net value of the input voltage is the sum.
_-.,::2-'-!.T)
v,1_- -t +-,-,(1_+---"-p,,,S)_+-,-,PL::..:(,-,-t
-

t,

t,

(eq.26)

The peak value of the input voltage in Figure 11d is determined by substituting values and letting t equal 4T.
V'I = 1 + (0.8) (-0.5) (4T - 2T)

t,

(eq.27)

= 1 - 0.4 (0.5) = 0.8V

After this peak pOint, the input ramp is no longer increasing
but the reflection is still arriving. Hence the net value of the
input voltage decreases. In this example, the later reflections are too small to be detected and the input voltage is
thus stable after time 6T. For the general case of repeated
reflections, the net voltage Vl(l) seen at the driven end of
the line can be expressed as follows, where the Signal
caused by the generator is VI (I)'

4-126

The voltage at the output end of the line is expressed in a
similar manner.

V'I(t) = Vl(t)

forO < t < 2T
V'I(t) = Vl(t)

+

(1

+

VT(t) = 0

PS) PL Vl(t-2T)

forO<-

T

2T

3T

4T

5T

6T

7T

8T

9T

lOT

l1T

12T

13T
TL/F/l0790-49

c. Net Output Signal Determined by Superposition
FIGURE 18. Basic Relationships Involved in Ringing

4-128

In Figure 18c, the output increments are added algebraically
by superposition. The starting point of each increment is
shifted upward to a voltage value equal to the algebraic sum
of the quiescent levels of all the preceding increments (i.e.,
0, 2B, O.4B, 1.68B, etc.). For time intervals when two ramps
occur simultaneously, the two linear functions add to produce a third ramp that prevails during the overlap time of the
two increments.

are intended to focus attention on the general methods
used to determine the interactions between high-speed logic circuits and their interconnections. Considering an interconnection in terms of distributed rather than lumped inductance and capacitance leads to the line impedance concept,
i.e., mismatch between this characteristic impedance and
the terminations causes reflections and ringing.
Series termination provides a means of absorbing reflections when it is likely that discontinuities and! or line impedance changes will be encountered. A disadvantage is that
the incident wave is only one-half the signal swing, which
limits load placement to the end of the line. ECl input capacitance increases the rise time at the end of the line, thus
increasing the effective delay. With parallel termination, i.e.,
at the end of the line, loads can be distributed along the line.
ECl input capacitance modifies the line characteristics and
should be taken into account when determining line delay.

It is apparent from the geometric relationships, that if the
ramp time A is less than twice the line delay, the first output
increment has time to rise to the full 2B amplitude and the
second increment reduces the net output voltage to O.4B.
Conversely, if the line delay is very short compared to the
ramp time, the excursions about the final value VG are
small.

Agure 18c shows that the peak of each excursion is
reached when the earlier of the two constituent ramps
reaches its maximum value, with the result that the first
peak occurs at time A. This is because the earlier ramp has
a greater slope (absolute value) than the one that follows.

REFERENCES
1. Metzger, G. and Vabre, J., Transmission Lines with Pulse
EXCitation, Academic Press, (1969).

Actual waveforms such as produced by ECl or TTL do not
have a constant slope and do not start and stop as abruptly
as the ramp used in the example of Figure 18. Predicting the
time at which the peaks of overshoot and undershoot occur
is not as simple as with ramp excitation. A more rigorous
treatment is required, including an expression for the driving
waveform which closely simulates its actual shape. In the
general case, a peak occurs when the sum of the slopes of
the individual signal increment is zero.

2. Skilling, H., Electric Transmission Lines, McGraw-Hili,
(1951).
3. Matick, R., Transmission Lines for Digital and Communication Networks, McGraw-Hili, (1969).
4. Millman, J. and Taub, H., Pulse Digital and Switching
Waveforms, McGraw-Hili, (1965).
5. "Time Domain Reflectometry", Hewlett-Packard Journal,
Vol. 15, No.6, (February 1964).

SUMMARY

6. Feller, A., Kaupp H., and Digiacoma, J., "Crosstalk and
Reflections in High-Speed Digital Systems", Proceedings, Fall Joint Computer Conference, (1965).

The foregoing discussions are by no means an exhaustive
treatment of transmission line characteristics. Rather, they

4-129

~

""CD

:2:

: 5

u

0= 0.1481nslln

z

::;:

;4

(eq.2)

w

u

where d = wire diameter, h = distance from ground to wire
center.
Comparing Equation 1 and 2, the term 0.67 (0.8 w + t)
shows the equivalence between a round wire and a rectangular conductor. The term 0.475 Er + 0.67 is the effective
dielectric constant for microstrip Ee, considering that a microstrip line has a compound dielectric consisting of the
board material and air. The effective dielectric constant is
determined by measuring propagation delay per unit of line
length and using the following relationship.
Il = 1.016. ~ nslft
(eq. 3)

z

~

3

Q

2

::(j<>
:!!
::>
III

iE

Ii;

1

is

I

80

where Il = propagation delay, ns/ft.
Propagation delay is a property of the dielectric material
rather than line width or spacing. The coefficient 1.016 is
the reciprocal of the velocity of light in free space. Propagation delay for microstrip lines on glass-filled G-10 epoxy
boards is typically 1.77 nslft, yielding an effective dielectric
constant of 3.04.

"'"""
-----40

60
80
100
120
Zo - CHARACTERISTIC IMPEDANCE-II
TL/F/l0790-54

FIGURE 3. Mlcrostrlp Distributed Capacitance
Versus Impedance, G-10 Epoxy
Stripline
Stripline conductors are totally embedded. As a result, the
board material determines the dielectric constant. G-10
epoxy boards have a typical propagation delay of 2.26 nslft.
Equation 4 is used to calculate stripline impedances. 1•2

120~'-----r----.-----r----;-,

c:

I
w

Z _ (60) I (
4b
.fEr n 0.67 1T (0.8 w
o-

u

~100~~~--+-----r-----r---~~

+ t)

)

(eq.4)

where b = distance between ground planes, w = trace
width, t = trace thickness, w/(b-t) < 0.35 and lib < 0.25.
Figure 4 shows stripline impedance as a function of trace
width, using Equation 4 and various ground plane separations for G-10 glass-filled epoxy boards. Related values of
Co are plotted in Figure 5 .

w

Do

;;§
u

ti

iE

...
:!!
u
II:

:>:

u
I

co
I
w

~

<>
z

~

70 f--l1r-.....30<4------+------l'-----l

Do

;;§

TUF/l0790-53

<>

ti

FIGURE 2. Microstrip Impedance
Versus Trace Width, G-10 Epoxy

60 ""',---*-.....::!~+-----l-----l

iE

~

Using Er = 5.0 in Equation 1, Figure 2 provides microstrip
line impedance as a function of width for several G-10
epoxy board thicknesses. Figure 3 shows the related Co
values, useful for determining capacitive loading effects on
line characteristics, (Equation 15).

~ 50~---~----~~--~~~~

<>
I
~

~.0~5::-0-......~:::---~~~-~~:O""'~0.025

System designers should ascertain tolerances on board dimensions, dielectric constant and trace width etching in order to determine impedance variations. If conformal coating
is used the effective dielectric constant of microstrip is increased, depending on the coating material and thickness.

TRACE WIDTH - INCHES
TUF/l0790-55

FIGURE 4. Strlpllne Impedance
Versus Trace Width, G-10 Epoxy

4-131

~ r-------------------------------------------------~----------------------------__,

.....

z~
II(

supply can provide the Thevenin equivalent of a single resistor to - 2V if a separate termination supply is not available, Figure 6b. The average power dissipation in the
Thevenin equivalent resistors is about 10 times the power
dissipation in the single resistor returned to - 2V, as shown
in Figures 10 and 13. For either parallel termination method,
decoupling capacitors are required between the supply and
ground (Chapter 6).

:z: 5
~0.188 nslln
~

~

4

......

w

CJ

z

i!

~
~

..

~

3

~
...............

'--....

_ a. Parallel Termination

2

o--~:>-

o
-D• --"-0

II

E

--=......-q

1

is

I
(]

VTT

0

40

Zo -

50
60
70
80
CHARACTERISTIC IMPEDANCE - II

TLlF/t0790-57

TLlF/l0790-56

b. Thevenln Equivalent of RT and Vrr

FIGURE 5. Strlpline Distributed Capacitance
Versus Impedance, G-l0 Epoxy
Wire Wrap

Rl= VEE RT
VEE-VTT
Rl

~~ --f~

Wire-wrap boards are commercially available with three
voltage planes, positions for several 24-pin Dual-In-Line
Packages (DIP), terminating resistors, and decoupling capacitors. The devices are mounted on socket pins and interconnected with twisted pair wiring. One wire at each end of
the twisted pair is wrapped around a signal pin, the other
around a ground pin. The #30 insulated wire is uniformly
twisted to provide a nominal 930 impedance line. Positions
for Single-In-Line Package (SIP) terminating resistors are
close to the inputs to provide good termination characteristics.

VEE

'"

R2= VEE RT

VTT
TL/F/l0790-58

c. Equivalent Circuit for Determining
Approximate VOH and VOL Levels

Stitch Weld

60
EOH= -0.85 v --'"\N'v--. VOH

Stitch-weld boards are commercially available with three
voltage planes and buried resistors between planes. The
devices are mounted on terminals and interconnected with
insulated wires that are welded to the backside of the terminals. The insulated wires are placed on a controlled thickness over the ground plane to provide a nominal impedance
of 500. The boards are available for both DIPs and flatpaks.
Use of flatpaks can increase package density and provide
higher system performance.

EOL=-1.67V

~

Rr
VOL
VTT

811

TL/F/l0790-59

Discrete Wired

d. FlOOK Output Characteristic with Terminating
Resistor RT Returned to Vrr = -2.0V

Custom Multiwire' boards are available with integral power
and ground planes. Wire is placed on a controlled thickness
above the ground plane to obtain a nominal impedance line
of 550. Then holes are drilled through the wire and board.
Copper is deposited in the drilled holes by an additive-electrolysiS process which bonds each wire to the wall of the
holes. Devices are soldered on the board to make connection to the wires.

-0

~ .J/:. SLJPE~8.0~ , ~slopt=aro
I
1 -8 '\ r-..~r--...
I\~ f'., 1'...,
I
...z -12
........ ~=1000
w
\\
-4

II:
II:
:::I

'Multiwire is a registered trademark of the Multiwire Corporation.

...
......

CJ

Parallel Termination
Terminating a line at the receiving end with a resistance
equal to the characteristic line impedance is called parallel
termination, Figure 6a. FlOOK circuits do not have internal
pull-down resistors on outputs, so the terminating resistor
must be returned to a voltage more negative than VOL to
establish the LOW-state output voltage from the emitter follower. A -2V termination return supply is commonly used.
This minimizes power consumption and correlates with
standard test specifications for ECL circuits. A pair of resistors connected in series between ground (Vee) and the VEE

:::I

\

-20

\

-24

:::I

0

I

I'\.
I\. ['\.

-16

\

..........

"-

1\

-28

\

!; -32

E

RT=2501\

-36
-40
-2.0

VOL

V6Hl

\

~n

'\.RT=500

['.1
"e.~ = 37 j5 0

1

-1.2
-0.6
-0.4
Vour - OUTPUT VOLTAGE - V

-1.6

-0
TLlF/t0790-60

FIGURE 6. Parallel Termination

4-132

Using 15% reflection limits as examples, the range of the
RT/ZO ratio is as follows.

FlOOK output transistors are designed to drive low-impedance loads and have a maximum output current rating of
50 mAo The circuits are specified and tested with a 50D.load
returned to -2V. This gives nominal output levels of
-0.955V at 20.9 mA and -1.705V at 5.9 mAo Output levels
will be different with other load currents because of the transistor output resistance. This resistance is nonlinear with
load current since it is due, in part, to the base-emitter voltage of the emitter follower, which is logarithmic with output
current. With the standard 50D. load, the effective source
resistance is approximately 6D. in the HIGH state and 6D. in
the lOW state.
The foregoing values of output voltage, output current, and
output resistance are used to estimate quiescent output levels with different loads. An equivalent circuit is shown in
Figure 6e. The ECl circuit is assumed to contain two internal voltage sources EOH and EOL with series resistances of
6D. and 6D. respectively. The values shown for EOH and
EOL are -0.65V and -1.67V respectively.

1.15 RT 0.65
RT
- > - > - 1.35>->0.74
(eq.6)
Zo
1.15
Zo
0.65
The permissible range of the RT/ZO ratio determines the
tolerance ranges for RT and ZOo For example, using the
foregoing ratio limits, RT tolerances of ± 10% allow Zo tolerance limits of + 22% and -19%; RT tolerances of ± 5%
allow Zo tolerance limits of +26% and -23%.
An additional requirement on the maximum value of RT is
related to the value of quiescent 10H current needed to insure sufficient negative-going signal swing when the ECl
driver switches from the HIGH state to the lOW state. The
npn emitter-follower output of the ECl circuit cannot act as
a voltage source driver for negative-going transitions. When
the voltage at the base of the emitter follower starts going
negative as a result of an internal state change, the output
current of the emitter follower starts to decrease. The transmission line responds to the decrease in current by producing a negative-going change in voltage. The ratio of the voltage change to the current change is, of course, the characteristic impedance Z00 Since the maximum decrease in current that the line can experience is from 10H to zero, the
maximum negative-going transition which can be produced
is the product 10H Zoo
If the 10H Zo product is greater than the normal negative-going signal swing, the emitter follower responds by limiting
the current change, thereby controlling the signal swing. If,
however, the 10H Zo product is too small, the emitter follower is momentarily turned off due to insufficient forward bias
of its base-emitter junctions, causing a discontinuous negative-going edge such as the one shown in Figure 14. In the
output-lOW state the emitter follower is essentially nonconducting for VOL values more positive than about
-1.55V. Using this value as a criterion and expressing 10H
and VOH in terms of the equivalent circuit of Figure 6e, an
upper limit on the value of RT can be developed.

The linearized portion of the FlOOK output characteristic
can be represented by two equations:
For VOH: VOUT = -650 -6 OUT
For VOL: VOUT = -1670 -6 lOUT
where lOUT is in mA, VOUT is in mY.
If the range of lOUT is confined between 6 mA to 40 mA for
VOH, and 2 mA to 16 mA for VOL, the output voltage can be
estimated within ± 10 mV (Figure 6d).
An ECl output can drive two or more lines in parallel, provided the maximum rated current is not exceeded. Another
consideration is the effect of various loads on noise margins. For example, two parallel 75D. terminations to -2V
(Figure 6d) give output levels of approximately -1.000V
and -1.716V. Noise margins are thus 35 mV less in the
HIGH state and 11 mV more in the lOW state, compared to
50D.load conditions. Conversely, a single 75D.load to -2V
causes noise margins 36 mV greater in the HIGH state and
11 mV less in the low state, compared to a 50D. load.
The magnitude of reflections from the terminated end of the
line depends on how well the termination resistance RT
matches the line impedance Z00 The ratio of the reflected
voltage to the incident voltage Vi is the reflection coefficient

AV

p.

RT

(eq.5)
Vi
RT+ZO
The initial signal swing at the termination is the sum of the
incident and reflected voltages. The ratio of termination signal to incident signal is thus:

RT < 1.64 Zo + 3.86D.
For Zo = 50D., the emitter follower cuts off during a negative-going transition if RT exceeds 66D.. Changing the voltage level criteria to -1.60V to insure continuous conduction
in the emitter follower gives an upper limit of 77D. for a 50D.
line. For a line terminated at the receiving end with a resistance to -2V, a rough rule-of-thumb is that termination resistance should not exceed line impedance by more than
50%. This insures a satisfactory negative-going signal swing
to ECl inputs connected along the line. The quiescent VOL
level, after all reflections have damped out, is determined by
RT and the ECl output characteristic.

VT

2RT
1 + P = --(eq.6)
Vi
RT + Zo
The degree of reflections which can be tolerated varies in
different situations, but to allow for worst-case circuits, a
good rule of thumb is to limit reflections to 15% to prevent
excursions into the threshold region of the ECl inputs connected along the line. The range of permissible values of RT
as a function of Zo and the reflection coefficient limitations
can be determined by rearranging Equation 5.

- =

=

1+ P
1- P

Zo - -

< (EOH

- Vn) Zo - (1.55 - IVnl) Ro
(eq.9)
1.55 -IEoHI
For a Vn of -2V, Ro of 6D. and EOH of -0.65V, Equation
4-9 reduces to

-=p=--

RT

10HZO > 1.55 - IVOHI

( EOH - Vn) Zo > 1.55 _IVnRo = EOHRTI
Ro + RT
Ro + RT

RT - Zo

V,

=

(eq. 7)

INPUT IMPEDANCE
The input impedance of ECl circuits is predominately capacitive. A single-function input has an effective value of
about 1.5 pF for FlOOK flatpak, as determined by its effect
on reflected and transmitted signals on transmission lines.

4-133

III

signal. The initial signal at the driver end is half amplitude,
rising to full amplitude only after the reflection returns from
the open end of the line. In Figure 7, one load is shown
connected at point D, aways from the line end. This input
receives a full amplitude signal with a continuous edge if the
distance I to the open end of the line is within recommended
lengths for unterminated line (Figure 10).

In practical calculations, a value of 2 pF should be used.
Approximately one third of this capaCitance is attributed to
the internal circuitry and two thirds to the flatpak pin and
internal bonding.
For F100K flatpak circuits, multiple input lines may appear
to have up to 3 pF to 4 pF but never more. For example, in
the F1 001 02, an input is connected internally to all five
gates, but because of the philosophy of buffering these
types of inputs in the FlOOK family this input appears as a
unit load with a capacitance of approximately 2 pF. For applications such as a data bus, with two or more outputs
connected to the same line, the capacitance of a passivelOW output can be taken as 2 pF.
Capacitive loads connected along a transmission line increase the propagation delay of a signal along the line. The
modified delay can be determined by treating the load capacitance as an increase in the intrinsic distributed capacitance of the line, discussed in Chapter 3. The intrinsic capacitance of any stubs which connect the inputs to the line
should be included in the load capaCitance. The intrinsic
capaCitance per unit length for G-10 epoxy boards is shown
in Figure 3 and 5 for microstrip and stripline respectively.
For other dielectric materials, the intrinsic capacitance Co
can be determined by dividing the intrinsic delay a (Equation
3) by the line impedance Zoo
The length of a stub branching off the line to connect an
input should be limited to insure that the signal continuing
along the line past the stub has a continuous rise, as opposed to a rise (or fall) with several partial steps. The point
where a stub branches off the line is a low impedance point.
This creates a negative coefficient of reflection, which in
turn reduces the amplitude of the incident wave as it continues beyond the branch pOint. If the stub length is short
enough, however, the first reflection returning from the end
of the stub adds to the attenuated incident wave while it is
still rising. The sum of the attenuated incident wave and the
first stub reflection provides a step-free signal, although its
rise time will be longer than that of the original signal. Satisfactory signal transitions can be assured by restricting stub
lengths according to the recommendations for unterminated
lines (Figure 10). The same considerations apply when the
termination resistance is not connected at the end of the
line; a section of line continuing beyond the termination resistance should be treated as an unterminated line and its
length restricted accordingly.

RS

Zo

RE
VEE
TL/F/l0790-61

FIGURE 7. Series Termination

The signal at the end has a slower rise time that the incident
wave because of capacitive loading. The increase in rise
time to the 50% point effectively increases the line propagation delay, since the 50% point of the signal swing is the
input signal timing reference pOint. This added delay as a
function of the product line impedance and load capacitance is discussed in Chapter 3.
Quiescent VOH and VOL levels are established by resistor
RE (Figure 7), which also acts with VEE to provide the negative-going drive into Rs and Zo when the driver output goes
to the lOW state. To determine the appropriate RE value,
the driver output can be treated as a simple mechanical
switch which opens to initiate the negative-going swing. At
this instant, Zo acts as a linear resistor returned to VOH.
Thus the components form a simple circuit of RE, Rs and Zo
in a series, connected between VEE and VOH. The initial
current in this series circuit must be sufficient to introduce a
0.38V transient into the line, which then doubles at the load
end to give 0.75V swing.
VOH - VEE
0.38
(eq.10)
~-RE + Ps + Zo
Zo
Any IOH current flowing in the line before the switch opens
helps to generate the negative swing. This current may be
quite small, however, and should be ignored when calculating RE.
Increasing the minimum signal swing into the line by 30% to
0.49V insures sufficient pull-down current to handle reflection currents caused by impedance discontinuities and load
capaCitance. The appropriate RE value is determined from
the following relationship.
IRE =

SERIES TERMINATION

Series termination requires a resistor between the driver
and transmission line, Figure 7. The receiving end of the line
has no termination resistance. The series resistor value
should be selected so that when added to the driver source
resistance, the total resistance equals the line impedance.
The voltage divider action between the net series resistance
and the line impedance causes an incident wave of half
amplitude to start down the line. When the signal arrives at
the unterminated end of the line, it doubles and is thus restored to a full amplitude. Any reflections returning to the
source are absorbed without further reflection since the line
and source impedance match. This feature, source absorption, makes series termination attractive for interconnection
paths involving impedance discontinuities, such as occur in

VOH - VEE ,0.49
'"
(eq.11)
RE + Rs + Zo
Zo
For the RE range normally used, quiescent VOH averages
approximately 0.955V and VEE = -4.5V. The value of Rs
is equal to Zo minus Ro (Ro averages 70). Inserting these
values and rearranging Equation 11 gives the following.
RE s: 5.23 Zo + 70
(eq. 12)
Power dissipation in RE is listed in Figure 14. The power
dissipation in RE is greater than in Rr of a parallel termination to - 2V, but still less than the two resistors of the
Thevenin equivalent parallel termination, see Figure 10, 13
and 14.

bac~Plane wiring.

.
...
..
The number of driven inputs on a series terminated line is
A disadvantage of series ter.mlnallOn I.S that .d~lven Inputs -limited by the voltage drop across Rs in the quiescent HIGH
must be near the end of the line to aVOid receiving a 2-step
state, caused by the finite input currents of the ECl loads.
IIH values are specified on data sheets for various types of

4-134

.

r-------------------------------------------------------------------,~

Z
en

inputs, with a worst-case value of 265 /LA for simple gate
inputs. The voltage drop subtracts from the HIGH-state
noise margin as outlined in Figure 8a.
However, there is more HIGH-state noise margin initially,
because there is less IOH with the RE load than with the
standard 50nload to -2V. This makes VOH more positive;
the increase ranges from 43 mV for a 50n line to B2 mV for
a 100n line. Using this VOH increase as a limit on the voltage drop across Rs assures that the HIGH-state noise margin is as good as in the parallel terminated case. Dividing
the VOH increase by Rs + Ro (= Zo) gives the allowed load
input current (Ix in Figure 8a). This works out to 0.B6 mA for
a 50n line, 0.92 mA for a 75n line and 0.B2 mA for a 100n
line. load input current greater than these values can be
tolerated at some sacrifice in noise margin. If, for example,
an additional 50 mV loss is feasible, the maximum values of
current become 1.B6 mA, 1.59 mA and 1.32 mA for 50n,
75n and 100n lines respectively.
An ECl output can drive more than one series terminated
line, as suggested in Figure 8b, if the maximum rated output
current of 50 mA is not exceeded. Also, driving two or more
lines requires a lower RE value. This makes the quiescent
IOH higher and consequently VOH lower, due to the voltage
drop across Ro. This voltage drop decreases the HIGHstate noise margin, which may become the limiting factor
(rather than the maximum rated current), depending on the
particular application.
The appropriate RE value can be determined using Equation
13 for VEE = - 4.5V.

.2... ~
RE

1
6.23 Zl - RS1

+

6.23 Z2 - RS2

......

""'

TL/F/l0790-62

a. Noise Margin loss Due to Load Input Current

TL/F/l0790-63

b. Driving Several lines from one Output

--~--+--4----VEE

TUF/l0790-64

c. Using Multiple Output Element for load Sharing
FIGURE 8. loading Considerations
for Series Termination
able. Undershoot (following the overshoot) must also be limited to prevent signal excursions into the threshold region of
the loads. Such excursions could cause exaggerated transition times at the driven circuit outputs, and could also
cause multiple triggering of sequential circuits. Signal swing,
exclusive of ringing, is slightly greater on unterminated lines
that on parallel terminated lines; IOH is less and IOL is greater with the RE load, (Figure 9a) making VOH higher and VOL
lower.
For worst case combinations of driver output and load input
characteristics, a 35% overshoot limit insures that system
speed is not compromised either by saturating an input on
overshoot or extending into the threshold region on the following undershoot.
For distributed loading, ringing is satisfactorily controlled if
the 2-way modified line delay does not exceed the 20% to
BO% rise time of the driver output. This relationship can be
expressed as follows, using the symbols from Chapter 3 and
incorporating the effects of load capacitance on line delay.

+ ..,....".,:-::-'---::--

6.23 Zs - Tss
(eq.13)

Circuits with multiple outputs (such as the F1 00112) provide
an alternate means of driving several lines simultaneous
(Figure 8e). Note, each output should be treated individually
when assiging load distribution, line impedance, and RE value.
UNTERMINATED LINES
Lines can be used without series or parallel termination if
the line delay is short compared to the signal rise time. Ringing occurs because the reflection coefficient at the open
(receiving) end of the line is positive (nominally + 1) while
the reflection coefficient at the driving end is negative (approximately - O.B). These opposite polarity reflection coefficients cause any change in signal voltage to be reflected
back and forth, with a polarity change each time the signal is
reflected from the driver. Net voltage change on the line is
thus a succession of increments with alternating polarity
and decreasing magnitude. The algebraic sum of these increments if the observed ringing. The general relationships
among rise time, line delay, overshoot and undershoot are
discussed in Chapter 3, using simple waveforms for clarity.
Excessive overshoot on the positive-going edge of the signal drives input transistors into saturation. Although this
does not damage an ECl input, it does cause excessive
recovery times and makes propagation delays unpredict-

tr = 2T' = 2t 8' = 2t 8

~1 +

CL

tCo

Solving this expression for the line length (t ):

_ 1 ~(CL)2
(tr)2
t max-+2

4-135

Co

8

_..9:.
2Co

(eq.14)

~ r-------------------------------------------------------------------------------~

.....

~

z011(

(II and Co), maximum lengths are calculated using Equation
14. For the convenience of those who are also using 10K
ECl, maximum recommended lengths of unterminated lines
are listed in Figure 10b to 10e.

-w- -r>. .;:-e
. . ~Zo-----'+:~,
Vee

Number of Fan-Out Loads

Zo
TLlF110790-65

a. Untermlnated Line

1

2

3

4

50
62

1.37·
1.33

1.13
1.07

0.95
0.S7

O.Sl
0.70

75
90
100

1.25
1.18
1.15

0.95
0.85
0.S2

0.75
0.66
0.61

0.61
0.53
0.49

·Length in inches.
Unit load = 2 pF, 8 = 0.148 nslinch

FIGURE 10a. F100K Maximum Worst-Case
Line Lengths for Untermlnated
Microstrip, Distributed Loading

Zo

H = 10 ns/diy
V =0.3 V/diy

TLIF110790-66

b. Line Voltages Showing Stair-step Trailing Edges

Number of Fan-Out Loads

2

3

4

6

8

50
62

4.15·
3.95

3.75
3.50

3.45
3.15

2.S5
2.55

2.45
2.10

75
90
100

3.75
3.55
3.45

3.25
3.00
2.85

2.85
2.60
2.45

2.25
2.00
1.85

1.S5
1.60
1.45

'Length In Inches.
Unit load = 3 pF, 8

= 0.148 ns/ln.

FIGURE 10b. 10K Maximum Worst-Case
Line Lengths for Unterminated
Mlcrostrip, Distributed Loading
Number of Fan-Out Loads

Zo

c

1

2

4

6

8

50
62

4.40·
4.30

3.65
3.45

2.60
2.30

1.90
1.60

1.40
1.15

75
90
100

4.20
4.05
3.90

3.20
2.95
2.80

2.05
1.75
1.60

1.40
1.05
0.90

0.95
0.65
0.50

'Length In Inches.
Unn load = 3 pF, 8

= 0.148 ns/ln.
FIGURE 10c. 10K Maximum Worst-Case
Line Lengths for Unterminated
Microstrip, Concentrated Loading

H = 1 ns/div
V =0.3 V/diy

TLIF110790-67

c. Load Gate Output Showing Net
Propagation Increase for Increasing
Values of RE: 3300, 5100,1 kO

Zo

FIGURE 9. Effect on RE Value
on Trailing-Edge Propagation
The shorter the rise time, the shorter the premissible line
length. For F100K ECl, the minimum rise time from 20% to
SO% is specified as 0.5 ns. Using this rise time and 2 pF per
fan-out load, calculated maximum line lengths for G-l0
epoxy microstrip are listed in Figure 10a. The length (I) in
the table is the distance from the terminating resistor to the
input of the device(s). For FlOOK ECl the case described in
Figure 10a is the only one calculated, since all other combinations are approximately the same. For other combinations
of rise time, impedance, fan-out or line characteristics

Number of Fan-Out Loads

2

3

4

6

8

50
62

3.30·
3.15

3.00
2.S0

2.70
2.50

2.25
2.00

2.90
1.65

75
90

3.00
2.S0

2.60
2.40

2.25
2.05

1.80
1.55

1.45
1.25

·Length in inches.
Unit load = 3 pF, 8

= 0.188 ns/in.
FIGURE 10d. 10K Maximum Worst-Case
Line Lengths for Untermlnated
Strlpllne, Distributed Loading

4-136

lines to the driver output. Waveforms at the termination resistor (point A) are shown in the multiple exposure photograph of Figure 11b. The upper trace shows a normal signal
without stubs connect.3d to the driver. The middle trace
shows the effect of connecting one stub to the driver. The
step in the negative-going edge indicates that the quiescent
IOH current through RT is not sufficient to cause a full signal
for both lines. The relationship between the quiescent IOH
current through RT and the negative-going signal swing was
discussed earlier in connection with parallel termination .
The bottom trace in Figure 11 shows the effect of connecting two stubs to the driver output. The steps in trailing edge
are smaller and more pronounced. The deteriorated trailing
edge of either the middle or lower waveform increas-

Number of Fan-Out Loads

Zo

1

2

4

6

8

50
62

3.45·
3.40

2.85
2.70

2.00
1.80

1.50
1.30

1.10
0.90

75
90
100

3.30
3.15
3.10

2.55
2.35
2.20

1.60
1.40
1.25

1.10
0.85
0.70

0.75
0.50
0.40

• Length in inches.
Unit load

~

3 pF, 8

~

0.188 ns/in.

FIGURE 10e. 10K Maximum WorstCase Line Lengths for Unterminated
Stripllne, Concentrated Loading
A load capacitance concentrated at the end of the line restricts line length more than a distributed load does. Maximum recommended lengths for fiberglass epoxy dielectric
and a 0.5 ns rise time are listed in Figure 10 for microstrip.
For line impedances not listed, linear interpolation can be
used to determine appropriate line lengths. Appropriate line
lengths for dielectric materials with a different propagation
constant /) can be determined by multiplying the listed values by the fiberglass epoxy /) and then dividing by the /) of
the other material. For example, a line length for a material
which has a microstrip /) of 0.1 ns/inch is determined by
multiplying the length given in the microstrip table (for a
desired impedance and load) by 0.148 and dividing by 0.1.
Resistor RE must provide the current for the negative-going
signal at the driver output. Line input and output waveforms
are noticeably affected if RE is too large, as shown in Figure
9b. The negative-going edge of the signal falls in stair-step
fashion. with three distinct steps visible at point A. The
waveform at point B shows a step in the middle of the negative-going swing. The effect of different RE values on the
net propagation time through the line and the driven loads is
evident in Figure ge which shows the output signal of one
driven gate in a multiple exposure photograph. The horizontal sweep (time axis) was held constant with respect to the
input signal of the driver. The earliest of the three output
signals occurs with an RE value of 330n. Changing RE to
510n increases the net propagation delay by 0.3 ns, the
horizontal offset between the first and second signals.
Changing RE to 1 kn produces a much greater increase in
net propagation delay, indicating that the negative-going
signal at B contains several steps. In practice, a satisfactory
negative-going signal results when the RE value is chosen
to give an initial negative-going step of 0.6V at the driving
end of the line. This gives an upper limit on the value of RE,
as shown in Equation 15.
initial step =

t:. t • Zo

= (VOH - VEE)

RE +Zo

a. Multiple Lines

vn
TUF/l0790-68

b. Waveforms at Termination Point A

H= 5 ns/dlv
V=O.S V/dlv
Tl/F/l0790-69

c. Equivalent Circuit for Determining Initial·

Zo ~ 0.6

Negative Voltage Step at the Driver Output

-'AT

RE = s: 6.25 Zo
(eq.15)
An ECl output can drive two or more unterminated lines,
provided each line length and loading combination is within
the recommended constraints. The appropriate RE value is
determined from Equation 15. using the parallel impedance
of the two or more lines for Zo0

z,

-

Q

-r-x
R

Z3

An ECl output can simultaneously drive terminated and unterminated lines, although the negative-going edge of the
signal shows two or more distinct steps when the stubs are
long unless some extra pull-down current is provided. Figure
11a shows an ECl circuit driving a parallel terminated line,
with provision for connecting two worst-case unterminated

VEE

TL/F/l0790-70

FIGURE 11. Driving Terminated
and Unterminated Lines in Parallel

4-137

es the switching time of the cirucit connected to point A. If
this extra delay cannot be tolerated, additional pull-down
current must be provided. One method uses a resistor to
VEE as suggested in Figure 11a. The initial negative-going
step at point A should be about 0.7V to insure a good fall
rate through the threshold region of the driven gate. The
initial step at the driver output should also be 0.7V. If the
driver output is treated as a switch that opens to initiate the
negative-going signal, the equivalent circuit of Figure 11c
can be used to determine the initial voltage step at the driver output (point X). The value of the current source IRT is the
quiescent IOH current through RT. Using Z' to denote the
parallel impedance of the transmission lines and I::. V for the
desired voltage step at X, the appropriate value of RE can
be determined from the following equation, using absolute
values to avoid polarity confusion.
RE = (IVEEI -lvoHI- I::. VI) • (II::. vi

vn
TLlF/10790-71

FIGURE 12. Data Bus or Party Line
using multiple output gates (F100112) and paralleling two
outputs for each driver. In the quiescent LOW state, termination current is shared among all the output transistors on
the line. This sharing makes VOL more positive than if only
one output were conducting all of the current. For example,
a 1000 line terminated at both ends represents a net 500
DC load, which is the same as the data sheet condition for
VOL. If one worst-case output were conducting all the current, the VOL would be -1.705V. If another output with
identical DC characteristics shares the load current equally,
the VOL level shifts upward by about 25 mV. Connecting two
additional outputs for a total of four with the same characteristics shifts VOL upward another 22 mY. Connecting four
more identical outputs shifts VOL upward another 20 mY.
Thus the VOL shift for eight outputs having identical worstcase VOL characteristics is approximately 67 mV. In practice, the probability of having eight circuits with worst-case
VOL characteristics is quite low. The output with the highest
VOL tends to conduct most of the current. This limits the
upward shift to much less than the theoretical worst-case
value. In addition, the LOW-state noise margin is specified
greater than the HIGH-state margin to allow for VOL shift
when outputs are paralleled.
In some instances a single termination is satisfactory for a
data bus, provided certain conditions are fulfilled. The single
termination is connected in the middle of the line. This requires that for each half of the line, from the termination to
the end, the line length and loading must comply with the
same restrictions as unterminated lines to limit overshoot
and undershoot to acceptable levels. The termination
should be connected as near as possible to the electrical
mid-point of the line, in terms of the modified line delay from
the termination to either end. Another restriction is that the
time between successive transitions, i.e., the nominal bit
time, should not be less than 15 ns. This allows time for the
major reflections to damp out and limits additive reflections
to a minor level.

~'IIRTIZ')

For a sample calculation, assume that RT and the line impedances are each 1000, VOH is -0.955V, I::. V is 0.750V,
VEE is -4.5V and Vn is - 2V. IRT is thus 10.45 mA and the
calculated value of RE is 2320. In practice, this value is on
the conservative side and can be increased to the next larger (10%) standard value with no appreciable sacrifice in
propagation through the gate at pOint A.
Again, the foregoing example is based on worst-case stub
lengths (the longest permissible). With shorter stubs, the
effects are less pronounced and a point is reached where
extra pull-down current is not required because the reflection from the end of the stub arrives back at the driver while
the original signal is still falling. Since the reflection is also
negative going, it combines with and reinforces the falling
Signal at the driver, eliminating the steps. The net result is a
smoothly falling signal but with increased fall time compared
to the stubless condition.
The many combinations of line impedance and load make it
practically impossible to define just with stub length begins
to cause noticeable steps in the falling Signal. A rough ruleof-thumb would be to limit the stub length to one-third of the
values given in Figure 10.
DATA BUSSING
Data bussing involves connecting two or more outputs and
one or more inputs to the same signal line, (Figure 12). Any
one of the several drivers can be enabled and can apply
data to the line. Load inputs connected to the line thus receive data from the selected source. This method of steering data from place to place simplifies wiring and tends to
minimize package count. Only one of the drivers can be
enabled at a given time; all other driver outputs must be in
the LOW state. Termination resistors matching the line impedance are connected to both ends of the line to prevent
reflections. For calculating the modified delay of the line
(Chapter 3) the capacitance of a LOW (unselected) driver
output should be taken as 2 pF.
An output driving the line sees an impedance equal to half
the line impedance. Similarly, the quiescent IOH current is
higher than with a single termination. For line impedance
less than 1000, the IOH current is greater than the data
sheet test value, with a consequent reduction of HIGH-state
noise margin. This loss can be eliminated if necessary by

WIRED-OR
In general-purpose wired-OR logic connections, where two
or more driver outputs are expected to be in the HIGH state
simultaneously, it is important to minimize the line length
between the participating driver outputs, and to place the
termination as close as possible to the mid-point between
the two most widely separated sources. This minimizes the
negative-going disturbances which occur when one HIGH
output turns off while other outputs remain HIGH. The driver
output going off represents a sudden decrease in line current, which in turn generates a negative-going voltage on
the line. A finite time is required for the other driver outputs
(quiescently HIGH) to supply the extra current. The net re-

4-138

suit is a "V" shaped negative glitch whose amplitude and
duration depend on three factors: current that the off-going
output was conducting, the line impedance, and the line
length between outputs. If the separation between outputs
is kept within about one inch, the transient will not propagate through the driven load circuits.
If a wired-OR connection cannot be short, it may be necessary to design the logic so that the signal on the line is not
sampled for some time after the normal propagation delay
(output going negative) of the element being switched. Normal propagation delay is defined as the case where the element being switched is the only one on the line in the HIGH
state, resulting in the line going LOW when the element
switches. In this case, the propagation delay is measured
from the 50% point on the input signal of the off-going element to the 50% point of the signal at the input farthest
away from the output being switched. The extra wiring time
required in the case of a severe negative glitch is, in a
worst-case physical arrangement, twice the line delay between the off-going output and the nearest quiescently
HIGH output, plus 2 ns.

transient reaches point B. Consequently, the transient duration observed at C is shorter by twice the line delay from A
to B.

I'DRr

VTT
TLlF110790-72

FIGURE 13_ Relative to Wired-OR Propagation
BACKPLANE INTERCONNECTIONS
Several types of interconnections can be used to transmit a
signal between logic boards. The factors to be considered
when selecting a particular interconnection for a given application are cost, impedance discontinuities, predictability of
propagation delay, noise environment, and bandwidth. Single-ended transmission over an ordinary wire is the most
economical but has the least predictable impedance and
propagation delay. At the oPPosite end of the scale, coaxial
cable is the most costly but has the best electrical characteristics. Twisted pair and similar parallel wire interconnection cost and quality fall in between.
For single-wire transmission through the backplane, a
ground plane or ground screen (Chapter 5) should be provided to establish a controlled impedance. A wire over a
ground plane or screen has a typical impedance of 1500.
with variations on the order of ±33%, depending primarily
on the distance from ground and the configuration of the
ground. Figure 14 illustrates the effects of impedance variations with a 15-inch wire parallel terminated with 1500. to
-2V. Figure 14b shows source and receiver waveforms
when the wire is in contact with a continuous ground plane.

An idea of how the extra waiting time varies with physical
arrangement can be obtained by qualitatively comparing the
signal paths in Figure 13. With the outputs at A and B quiescently HIGH, the duration of the transient observed at C is
longer if B is the off-going output than if A is the off-going
element. This is because the negative-going voltage generated at B must travel to A, whereupon the corrective signal
is generated, which subsequently propagates back toward
C. Thus the corrective signal lags behind the initial transient,
as observed at C, by twice the line delay between A and B.
On the other hand, if the output at A generates the negativegoing transient, the corrective response starts when the
A

1=15"

WIRE OVER GND PLANE OR SCREEN
1500

-2.0V
TL/F/l0790-73

a. Wire over Ground Plane or Screen

_A

_B

H::;5 nsJdiv
V=O.4 Vldiv

H =5 nsldiv
V=O.4 nsldiv

TLIF/10790-7S

TL/F110790-74

c. Wire Spaced 'Ia" from Ground Screen

b. Wire in Contact with Ground Plane

FIGURE 14. Parallel Terminated Backplane Wire

4-139

»
z
I

CD

:;;:!

Signal propagation along a single wire tends to be fast because the dielectric medium is mostly air. However, impedance variations along a wire cause intermediate reflections
which tend to increase rise and fall times, effectively increasing propagation delay. Effective propagation delays
are in the range of 1.5 to 2.0 ns per foot of wire. Load
capacitance at the receiving end also increases rise and fall
time (Appendix A), further increasing the effective propagation delay.

The negative-going signal at the source shows an initial step
of only 80% of a full signal swing. This occurs because the
quiescent HIGH-state current IOH (about 7 mAl multiplied by
the impedance of the wire (approximately 900) is less than
the normal signal swing, and this condition allows the driver
emitter follower to turn off. The negative-going signal at the
receiving end is greater by 25% (1 + P = 1.25). The receiving end mismatch causes a negative-going reflection which
returns to the source and establishes the VOL level. The
positive-going signal at the source shows a normal Signal
swing, with the receiving end exhibiting approximately 25%
overshoot.
Figure 14c shows waveforms for a similar arrangement, but
with the wire about Ys inch from a ground screen. The impedance of the wire is greater than 1500 termination, but
small variations in impedance along the wire cause intermediate reflections which tend to lengthen the rise and fall
times of the signal. As a result, the received signal does not
exhibit pronounced changes in slope as would be expected
if a 2000 constant impedance line were terminated with
1500.
Series source resistance can also be used with single wire
interconnections to absorb reflection. Figure 15a shows a
16-inch wire with a ground screen driven through a source
resistance of 1000. The waveforms (Figure 15b) show that
although reflections are generated, they are largely absorbed by the series resistor, and the signal received at the
load exhibits only slight changes and overshoot. Series termination techniques can also be used when the Signal into
the wire comes from the PC board transmission line. Figure
16a illustrates a 12-inch wire over a ground screen, with 12inch microstrip lines at either end of the wire. The output is
heavily loaded (fan-out of 8) and the combination of impedances produces a variety of reflections at the input to the
first microstrip line, shown in the upper trace of Figure 16b.
The lower trace shows the final output; a comparison between the two traces shows the effectiveness of damping in
maintaining an acceptable signal at the output. Figure 16c
shows the signals at the input to the driving gate and at the
output of the load gate, with a net through-put time of 8.5
ns. The circuit in Figure 16a is a case of mismatched transmission lines, discussed in Appendix A.

16" WIRE OVER GROUND SCREEN B

TLlF/10790-76

a. Wire over Ground Screen

H = 10 ns/dl.
V =0.3 V/dl.
TLlF/10790-77

b. Series Terminated Waveform
FIGURE 15. Series Terminated Backplane Wire

4·140

~------------------------------------------------------------------,>

[

P

12' MICROSTRIPSl

OUTPUT

12' WIRE OVER
GROUND SCREEN

r£>-

_ _ .-1- _ _

INPUT
10011

a
-D;::::-~-=,~t!--- -----,-l--.-tR~

~

1

'h = 10011 Zo = 150 lila = 100 liB I
~

Vn
TLiF/l0790-81

a. Single-ended Twisted Pair

VEE

P

TL/F/l0790-78

a. Backplane Wire Interconnecting PC Board Lines

TL/F/l0790-82

-A

b. Differential Transmission Reception

H= 10 ns/di.
V=0.4 V/dl.
TL/F/l0790-79
TLiF/l0790-83

b. Signals into the First Microstrip and at the Loads

c. Backplane Data Bus
FIGURE 4-17. Twisted Pair Connections
gle-ended driving and receiving. In addition to improved
propagation velocity, the magnetic fields of the two conductors tend to cancel, minimizing noise coupled into adjacent
wiring.
Differential line driving and receiving complementary gates
as the driver and an F100114 line receiver is illustrated in
Figure 4-17b. Differential operation provides high noise immunity, since common mode input voltages between
-0.55Vand -3.0V are rejected. The differential mode is
recommended for communication between different parts of
a system, because it effectively nullifies ground voltage differences. For long runs between cabinets or near high power transients, interconnections using shielded twisted pair
are recommended.
Twisted pair lines can be used to implement party line type
data transfer in the backplane, as indicated in Figure 4-17c.
Only one driver should be enabled at a given time; the other
outputs must be in the VOL state. The VBB reference voltage is available on pin 22 of the fiatpak and pin 19 of the
dual-in-line package for the F100114.
In the differential mode, a twisted pair can send high-frequency symmetrical signals, such as clock pulses, of
100 MHz over distances of 50 to 100 feet. For random data,
however, bit rate capability is reduced by a factor of four or
five due to line rise effects on time jitter.3

H= 10 nsldi.
V=O.4 Vldiv
TL/F/l0790-80

c. Input to Driving Gate and Output of Load Gate
FIGURE 4-16. Signal Path with Sequence
of Microstrip, Wire, Mlcrostrlp
Better control of line impedance and faster propagation can
be achieved with a twisted pair. A twisted pair of AWG 26
Teflon' insulated wires, two twists per inch, exhibits a propagation delay of 1.33 nslft and an impedance of 1150.
Twisted pair lines are available in a variety of sizes, impedances and multiple-pair cables. Figure 4-178 illustrates sin'Teflon is a registered trademark of E.I. du Pont de Nemours Conpany.

4-141

ZI

en
~

Coaxial cable offers the highest frequency capability. In addition. the outer conductor acts as a shield against noise.
while the uniformity of characteristics simplifies the task of
matching time delays between different parts of the system.
In the single-ended mode. Figure 4-188.50 MHz signals can
be transferred over distances of 100 feet. For 100 MHz operation. lengths should be 50 feet or less. In the differential
mode. Figures 4-18b.c, the line receiver can recover smaller signals, allowing 100 MHz signals to be transferred up to
100 feet. The dual cable arrangement of Figure 4-18c provides maximum noise immunity. The delay of coaxial cables
depends on the type of dielectric material. with typical delays of 1.52 nslft for polyethylene and 1.36 nslft for cellular
polyethylene.
.

REFERENCES
1. Kaupp. H. R., "Characteristics of Microstrip Transmission
Lines." IEEE Transaction on Electronic Computers. Vol.
EC-16 (April. 1967).
2. Harper. C. A.. Handbook of Wiring, Cabling and Interconnections for Electronics. New York: McGraw-Hili, 1972.
3. True. K. M.• "Transmission Line Interface Elements." The
TTL Applications Handbook, Chapter 14 (August 1973).
pp.14-1-14-14.

-D-irH;---:;'Zo------+l+J
....
-, -rRT=Zo
D-

f

VTT

-If
'

TLlF/l0790-84

a. Single-Ended Coaxial Transmission

~~"2
2

VTT
TL/F/l0790-85

b. Differential Coaxial Transmission
VTT

,-

4

,-

~

,-

RT

fj>

i JR~
VTT

TL/FI10790-86

c. Differential Transmission with Grounded Shields
FIGURE 4-18. Coaxial Cable Connections

4-142

APPENDIXC
ECl DESIGN GUIDE:
POWER DISTRIBUTION AND THERMAL CONSIDERATIONS
INTRODUCTION

In practice, two communicating circuits might be located on
widely separated PC cards with other PC cards in between.
The net resistance then includes the incremental resistance
of the ground distribution bus from card to card, while the
ground current is successively increased by the contribution
from each card. Figure 2 illustrates a distribution bus for a
row of cards with incremental resistances along the bus.

High-speed circuits generally consume more power than
similar low-speed circuits. At the system level, this means
that the power supply distribution system must handle the
larger current flow; the larger power dissipation places a
greater demand on the cooling system. The direct current
(DC) voltage drop along ground busses affects noise margins for all types of ECl circuits. Voltage drops along VEE
busses have only a slight effect on F100K circuits, but they
require consideration to obtain the performance available
from the family.

~~~.-~---~
3 _ _ _ j· _ _ _ _ _ k _ _ _ _ _ n

CARD
POSITION

LOGIC CIRCUIT GROUND, Vee

TL/F/l0790-BB

The positive potential Vee and VeeA in ECl circuits is the
reference voltage for output voltages and input thresholds
and should therefore be the ground potential. When two
circuits are connected in a single-ended mode, any difference in ground potentials decreases the noise margins, as
discussed in Chapter 1. This effect for TTLlDTl circuits, as
well as for ECl circuits, is illustrated in Figure 1. The following analysis assumes some average value of current flowing
through the distributed resistance along the ground path between two circuits. For the indicated direction of IG, the shift
in ground potential decreases the lOW-state noise margin
of the TTLlDTl circuits and the HIGH-state noise margin of
the ECl circuits. If IG is flowing in the opposite direction, it
increases these noise margins, but decreases the noise
margins when the drivers are in the opposite state. For tabulation of ground currents in ECl, the designs must include
termination currents as well as lEE operating currents. ECl
logic boards which use microstrip or stripline techniques
generally have large areas of ground metal. This causes the
ground resistance to be quite low and thus minimizes noise
margin loss between pairs of circuits on the same board.

r = Incremental Bus Resistance between Positions
i = Average Ground Current per Card

FIGURE 2. Ground Shift Along a Row of PC Cards
The ground shift can be estimated by first determining an
average value of current per card based on the number of
packages, the mix of 881 and M81, and the number and
types of terminations. With n cards in the row, an average
ground current (i) per card, and an incremental bus resistance (r) between card positions, the bus voltage drops between the various positions can be determined as follows:
between pOSitions 1 and 2: vl-2 = (n - 1) ir
between positions 1 and 3: vl-3 = (n - 1) ir
(n - 2) ir

+

between pOSitions 1 and 4: vl-4 = (n - 1) ir
(n - 2)ir
(n - 3)ir

+
+

between 1 and n:

I

rr:

vl-n = ir [en - 1) +
(n - 2) + (n - 3)
+ ... + [n - (n - 1)1l
= ir [1 + 2 + 3
+ ... + (n - 1)1
n-l
vl-n = ir

TOTAL RESISTANCh Ro

L

n

1

For a row of 15 cards, for example, the total ground shift
between positions 1 and 15 is expressed as in Equation 1.
14
vl-15 = ir
TTl/DTl

L
1

TL/F/l0790-B7

= 105 ir

ECl

V'OL =VOL = +IGRG
V'OH=VOH+IGRG
IGRG=(V'OL -VmJ = Noise Margin Decrease=IGRG=(V'OH-VOH)

FIGURE 1. Effect of Ground Resistance
on Noise Margins

4·143

n = ir (1

+ 2 + 3 + ... + 13 + 14)
(eq.1)

~

"'~"

z

c(

,---------------------------------------------------------------------------------,
The ground shift between any two card positions j and k can
be determined as follows for the general case.

+ [n - 0 + 1)1 ir +
+ 2)1 ir
+ ... + (n - ij + (k-j-1)11 ir
(k - j) nir - ir (j + 0 + 1) + 0 + 2)
+ ... + ij + (k-j-1)]l

Vj-k = (n - j) ir

[n - (j

=

k-I

Vj_k = (k - j) nir - ir

L

(eq. 2)
k-I

n = irl(k - j) n -

j

L

nl

Resistance
mn Per Foot

#2
#6
#10
#12
#18
#22
#26
#30

0.156
0.395
0.999
1.588
6.385
16.14
40.81
103.2

Cross-Sectional
Area
Square Inches·
5.213 x 10- 2
2.062 x 10- 2
8.155 x 10- 3
5.129 x 10- 3
1.276 X 10- 3
5.046 X 10- 4
1.996 x 10- 4
7.894 x 10- 5

FIGURE 3. Resistance and Cross-Sectional Area
of Several Sizes of Annealed Copper Wire

J

In a row of 15 cards, the ground shift between positions four
and nine, for example, is determined as follows.
Vj_k = ir [(9 - 4) 15 - (4 + 5 + 6 + 7 + 8)1
(eq. 3)
= ir (75 - 30) = 45 ir

Copper resistivity = p = 1.724 X 10 -6 ncm

@

20·C

.
I
I
ReSistance of a conductor = p A= p

tw

The ground shift between the same number of positions
further down the row is less because of the decreasing current along the row. Consider the ground shift between card
positions 10 and 15.
vIO-15 = ir [(15 - 10)15 (10 + 11 + 12 + 13 + 14)]
= ir (75 - 60) = 15 ir .

AWG
BaS
Gauge

t = thickness

where: I = length
Sheet resistance Ps =

w = width

£ 0. per.!..

t
w
The length/width ratio (lIw) is dimensionless; therefore, the
resistance of a length of conductor of uniform thickness can
be calculated by first determining the number of "squares,"
then multiplying by the sheet resistance. For example, a
conductor one-eighth inch wide and three inches long has
24 squares; its resistance is 24 times the sheet resistance.
Since many thickness dimensions are given in inches, it is
convenient to express the resistivity in ohm-inch, as follows.
p(nin.) = p(ncm) + 2.54 = 6.788 x 10- 7 nino

(eq.4)

These examples illustrate several principles the designer
should consider regarding the ground distribution bus and
assignment of card positions. The bus resistance should be
kept as low as possible by making the cross-sectional areas
as large as practical. Logic cards which represent the heaviest current drain should be located nearest the end where
ground comes into the row of cards. Cards with single-ended logic wiring between them should be assigned to positions as close together as possible. Conversely, if the
ground shift between two card positions represents an unacceptable loss of noise margin, then the differential transmission and reception method i.e., twisted pair, should be
used for logic wiring between them, thereby eliminating
ground shift as a noise margin factor.

The use of sheet resistance and the "squares" concept is
illustrated by calculating the resistance of the conductor
shown in Figure 4. Assume the conductor is a 1 oz. copper
cladding with a 0.0012 inch minimum thickness on a PC
card.

+

11=2'

13=I.S"..i.

12=1-

Wl=114'I-Rl_:~R2
.
.'~R3---"

t

CONDUCTOR RESISTANCES
Conductors with large cross-sectional areas are required to
maintain low voltage drops along power busses. For convenience, Agure 3 lists the resistance per foot and the crosssectional area for more common sizes of annealed copper
wire. Other characteristics and a complete list of sizes can
be found in standard wire tables. A useful rule-of-thumb regarding resistances and, hence, areas is: as gauge numbers
increase, resistance doubles with every third gauge number;
e.g., the resistance per foot of # 10 wire is 1 mn, for # 13
wire it is 2 mo.. Similarly, the resistance per foot of #0 wire
is 0.078 mn, which is half that of # 2 wire.

I

'

•

,
~ IT

R TOTAL

11

w2=1/2"

TL/F/l0790-B9

FIGURE 4, Conductor of Uniform Thickness
but Non-Uniform Cross Section
Sheet resistance = Ps =

~

= 5.657 X 10- 4 0. per square
The number of squares S for the rectangular sections are as
follows.

For calculations involving conductors having rectangular
cross sections, it is often convenient to work with sheet
resistance, particularly for power distribution on PC cards.
Copper resistivity is usually given in ohm-centimeters, indicating the resistance between opposing faces of a 1 cm
cube. The sheet resistance of a conductor is obtained by
dividing the resistivity by the conductor thickness. These
relationships follow.

S1

=

.!!. = 8
WI

13
S3=-=3
W2

The middle average segment of the conductor has a trapeziodal shape. The average of WI and w2 can be used as the
effective width, within 1% accuracy, if the W2/WI ratio is 1.5
or less. Otherwise, a more exact result is obtained as follows.
S2 = __
12_ln (W2) = 41n 2 = 2.77 squares
w2 -WI
WI
Total R = Rt + R2
= 7.51 mn

4-144

+ R3

= Ps(SI

+ S2 + S3)

(eq.5)

1.0~~m

As another example, assume that a 1 oz. trace must carry a
200 rnA current six inches with a voltage drop less than
10 mY.
Vmax 0.Q1
Rmax = - , - = Q.2 = 0.050
(eq.6)

0.05 = PSw

~

\

~

0.10 \ .

~

T=

0.5 ~~~~~~~~~~~~~~
."
"

,\.1\

~ 0.20'1--~1\1r-P..r-r.:1W-H1"",\,.-l.d-I\-4.-+++++H--~~

I

w

ffl~

1\

..

~ 0°'"

is',-0J\'''

~

20 Ps

ti 0.05 ~-+~~~c~~~.~~~~~,~~~
Il:~
E
0.."

w = 120 Ps = (120) 5.657 X 10- 4 = 67.9 X 10- 3
:. minimum trace width, w = 6B mils
At a higher current level, consider the voltage drop in a
conductor 20 mils thick, 1.25 inches wide and 3 feet long
carrying a 50A current.
6.7BB X 10-7
Ps = 2 X 10 2 = 3.364 X 10- 5 0 per square

8

2 oz.
3 oz.
5 oz.
0.Q1 in.

Sheet
Resistance
o per
Square
2.715
1.B86
1.077
6.7BB

X
X
X
X

Thickness

0.02 in.
0.05 in.
Y1s in.
% in.

1

X
X
X
X

Nominal
Weight

oz/ft2

Weight, %

In.

0.0007
0.0014

0.0178
0.0355

1f2

+10
+10

+0.0002
+0.0004
-0.0002
+0.0007
-0.0003
+0.0006
+0.0006
+0.0007
+O.OOOB
+0.001
+0.0014
+0.002

2

+10

0.0042
0.0056
0.0070
0.0084
0.0098
0.014
0.Q196

0.1065
0.1432
0.17BO
0.2130
0.2460
0.3530
0.4920

3
4
5
6
7
10
14

+10
+10
+10
+10
+10
+10
+10

20

50

100 200

500

mn PER FOOT

RT = R20'C [1 + 0.004 (T + 20'C)1
At 55'C:

(eq. B)

R = R20'C [1 + 0.004 (55'C - 20'C)1 = 1.14 R20'C
When specifying power bus dimensions for PC cards can·
taining many IC packages, designers should bear in mind
that excessive current densities can cause the copper tern·
perature to rise appreciably. Figure 8 illustrates the ohmic
heating effect of various current densities.1
10r----,-----r~~~--

mm

0.0715

10

TEMPERATURE COEFFICIENT
The resistances in Figures 3, 5, and 7, as well as those used
in the sample calculations, are 20'C values. Since copper
resistivity has a temperature coefficient of approximately
0.4%I"C, the resistance at a temperature (T) can be deter·
mined as follows.

__----~

J~/V

Tolerances
By

0.0028

5

TUF/10790-90

10- 5
10- 5
10- 5
10- 6

In.

1

\rI\

FIGURE 7. Conductor Resistance vs
Thickness and Width

FIGURE 5. Sheet Resistance for Various
Thicknesses of Copper
Nominal Thickness

2

RESISTANCE -

Sheet
Resistance

3.364
1.358
1.OB6
2.715

II \. I\~

0.011-....L.....L..u.u.u~I...L...L.:L.L.IlI.J.I.u......IlI..A.u

0 per Square

10- 4
10- 4
10- 4
10- 5

~I'\

f'%l."

I-

0.02

V = IR - (50) (3.364 X 10- 5) ~
(eq.7)
1.25
= 0.0484 = 48.4 mV
Sheet resistances for various copper thicknesses are listed
in Figure 5. Standard thicknesses and tolerances for copper
cladding are tabulated in Figure 6 and resistance per foot as
a function of width is shown in Figure 7.
Weight
or
Thickness

"

c

..
I

8.01----t-V,~/(~0.C+-/--1-/--..1

zw

a:
a:

::>

6.0

/

/

1

'

V

(.)

/

/

4.0,/

/10'C

Y

2.0 5~0-----'1~00~--1.,-J5~0----2J...00----2..L50----300.J
CROSS-SECTIONAL AREA - mU2
TUF/10790-91

FIGURE 8. Temperature Rise with Current
Density In PC Board Traces

FIGURE 6. Thickness and Tolerances for
Copper Cladding

4·145

..... r---------------------------------------------------------------------,
DISTRIBUTION IMPEDANCE
ground direclly underneath the signal trace. Therefore, if
~

~

z

l~

R2

VEE = -4.5 V

VTT= -2 V
TL/F/l0790-96

RT

.n

R1fi
= 1.80RT

R2.!l
= 2.25RT

lEE (avg)
mA

PO(8vg)mW
Resistors

50
62
75
82
90
100
120
150

90
112
135
148
162
180
216
270

113
140
169
185
203
225
270
338

28.2
22.7
18.8
17.2
15.7
14.1
11.7
.9.4

109
87.9
72.7
66.5
60.5
54.5
45.4
36.3

FIGURE 13. Series Divider for Thevenln
Equivalent Terminations

rVEE= -4.5 v

TUF/l0790-97

Po (avg)mW

Zo
.n

RE

.n

lEE (8Vg)
mA

ICOutput

RE

50
62
75
90
100
120
150

269
331
399
477
530
634
791

9.8
7.9
6.5
5.4
4.9
4.1
3.2

12.9
10.4
8.6
7.1
6.5
5.4
4.2

25.8
20.6
16.8
13.9
12.7
10.6
8.1

TJ = TA

+ P08JA

(eq.10)

24·PIN FLATPAK (4 VI Al203 BASE

24-PIN FLATPAK (4 0) BoO BASE

FIGURE 14. Average Current and Power Dissipation
Using Pull-Down Resistor to VEE
THERMAL CONSIDERATIONS
System cooling requirements for ECl circuits are based on
three considerations: (1) the need to minimize temperature
gradients between circuits communicating in the single-ended mode, (2) the need to control the temperature environment of each circuit to assure that the parameters stay with·
in guaranteed limits, and (3) the need to insure that the
maximum rated junction temperature is not exceeded.
Temperature gradients are of no practical concern with
F100K circuits since they are temperature compensated;

AIR FLOW RATE - LINEAR FTJMIN.
TL/F/l0790-98

FIGURE 15. Junction-to-Air Thermal
Resistance vs Air Flow Rate

4·148

.

3>
instance, on a densely packed logic board in a horizontal
attitude in still air, the effective ambient temperature for an
IC varies with its position. An IC in the middle of the board is
subjected to air that is partially heated by surrounding ICs.
Additionally, the temperature of the board rises due to heat
flow through the component leads. These effects can cause
a much higher junction temperature than might be expected.

Conversely, when the maximum rate junction temperature
(+ 150·C), the package power dissipation, and the air temperature are known, the minimum flow rate can be determined by first determining the maximum thermal resistance.
Maximum 6JA =

(150~~ TAl

(eq.11)

For this value of 6JA the minimum flow rate is determined
from Figure 15.
When the system designer plans to depend on natural convection for cooling, it is recommended that thermal tests be
conducted to determine actual conditions. The effectiveness of natural convection for cooling varies greatly. For

REFERENCE
1. Harper, C.A., Editor, Handbook of Wiring, Cabling and Interconnecting for Electronics, McGraw-Hili, 1972.

4-149

Z

en
.....
.;:.

National Semiconductor
Application Note 679
FilipeSanna
Louise Yeung

Point-to-Point
Fiber Optic Links
TABLE OF CONTENTS

FOOl PHY layers in parallel require only one pair of fiber
optiC cables, one pair of transceivers, and one set of PHY
layer chips per channel, while yielding a typical data
throughput of 600 Mbits/sec (for a system with eight channels).

1.0 POINT-TO-POINT APPLICATIONS
2.0 SYSTEM OVERVIEW
3.0 CHANNEL SYNCHRONIZATION
3.1 Synchronization Timing Examples
4.0 PHY LAYER COMPONENTS
4.1 System Block Diagram
4.2 Channel Block Diagram
5.0 HOST INTERFACE CONSIDERATIONS
5.1 Data Interface
5.2 Control Bus Interface
6.0 TIMING BUDGET FOR WIRED AND STRUCTURE
6.1 Pull-Up Scheme
6.2 GAL Scheme
INTRODUCTION
A station using the ANSI X3T9.5 (FDDI) physical layer standard can transmit and receive data at 100 Mbits/ sec
through a fiber optic cable. However, with several physical
layers connected together in parallel, each with its own fiber
optic cables for transmission and reception, the station can
transmit and receive data at much higher speeds. National
Semiconductor's physical (PHy) layer devices can be connected together in parallel to achieve such high bandwidth
pOint-to-point links. The National devices required to implement a PHY layer are the DP63231 Clock Recovery Device
(CRDTM device), the DP63241 Clock Distribution Device
(CDOTM device), and the OP63251/55 Physical Layer Controller Oevice (PLAYERTM device). The bandwidth of the
system depends on the number of PHY layers used-each
set of PHY layer devices contributes 100 Mbits/ sec to the
system.

Any application where data throughput is the limiting factor
to system performance is a candidate for a high-speed
point-to-point link. For example, a pOint-to-point link can be
installed between a CPU and a disk controller to speed up
information storage and retrieval times. Another application
area could be in the display capabilities of a graphics workstation which can be combined with the data processing
power of a supercomputer to achieve visualization for data
intensive simulations (Figure 1). As a third example, a highspeed networking backbone using a point-to-point link is depicted in Figure 2. Here, separate FOOl rings are connected
together with a high speed link which provides bridging between rings without loss of performance.
Fiber optiCS afford a greater physical separation between
stations than electrical signals. Hence, a fiber pOint-to-point
link can be used to extend SCSI or IPI transmissions up to
one kilometer.

TLlF/10797-1

FIGURE 1. Polnt-To-Polnt Link between a
Supercomputer and a Graphics Workstation

1.0 POINT-TO-POINT APPLICATIONS
The use of parallel FOOl PHY layers is a cost effective
method to increasing the data throughput in multiples of 100
Mb/s. This task can be accomplished utilizing an existing
FDOI fiber plant.

4-150

TLlF/10797-2

FIGURE 2. High Speed Networking Backbone
Using a Fiber OptiC Point-To-Point Link

2.0 SYSTEM OVERVIEW

After travelling through the fibers, the data arrives at Stetion
II. Each PHY layer on the receiving end reads data from the
fiber and presents its byte to the corresponding PHY"--INO
port (at 12.5 MHz) in Stetion II. SYS_INO then rejoins the
bytes back into the 32-bit word sent by Station I and can
present the data to the host (at 12.5 MHz). This demonstrates how Station I can send 32 bits to Station II in BO ns,
giving an effective data throughput of 400 Mbits/sec.
Even though this is a non-FOOl application, the general
rules for FOOl framing must be followed. In particular, each
frame must start with a JK symbol and end with valid FOOl
ending delimiter (Figure 4). Furthermore, the frame size
must be between three and 4500 bytes long (see PLAYER
device datasheet for more detail). At least four pairs of idle
symbols should be inserted between the frames to allow for
readjustment of the PLAYER device's elasticity buffer. However, to guarantee at least one opportunity to recenter the
elasticity buffer between frames in the event of clock drift or
a single line hit in the interframe gap, the user is advised to
insert eight idle symbol pairs.

A system using four PHY layers in parallel is shown in Figure
3. The diagram demonstrates conceptually how data is
passed from Station I to Station II at 400 Mbits/sec. Each of
the four PHY layers in Station I is connected to a PHY layer
in Station II with fiber optic cables. Since National Semiconductor PHY layers are full duplex, each pair of PHY layers is
linked by two fibers, one for transmission in each direction.
The system interface shown contains two parts.
SYS_REQ. which handles data transmission, and
SYS_INO, which handles data reception.
Suppose that Station I wants to transmit a 32-bit word of
data to Station II. SYS_REQ in Station I takes the data and
splits it into four bytes, one for each PHY channel. Each
PHY layer reads its byte from the PHY"--REQ ports of
SYS_REQ (at 12.5 MHz) and sends the data out across
the fiber as an B-bit serial stream at 100 Mbits/sec. (Note
that due to the 48/58 encoding scheme used by the PLAYER devices the data actually passes through the fiber as a
10-bit serial stream at 125 MHz.)
132 bits 130D47FAI

SYSJND

SYS..REQ

1

.1-

I

.1-

T

T

.1-

PHYLIND

PHYLREQ PHYLREQ PHY3_REQ PHY4_REQ

i

T

PHY2JND 1 PHY3_IND

PHY4_IND

~'~$.
3D

D4

7F

AI

!

AJND

A..REQ

A..IND

PHYI
PlUND

I

I A..REQ

A..IND

PHY2

PM_REQ

PM../HD

I PM_REQ

A..REQ

------ - - - - - - - - - - - --

PM_IND

A..REQ

AJND

PHY4

PHY3

PM_IND

PILREQ

PM-REQ

-

--

------- --------

Station I

Fibor Optic Links

-- - PM_REQ

-------- - - PM_REQ I PM_IND

PM_INO

,

PHYI
A..REQ

-- - - -- ----------- -I- PILREQ

PHY2

A..IND

A..REQ

I A..IND

A..REQ

~

3D

I
i

T

PILREQ

PM_IND

A..IND

A..REQ

T

.1PHY1..JHD

T

.1-

SYS_REQ

A..IHD

8

AI

7F

I

Station II

PHY4

$.

PHY1-REQ PHY2_REQ PHY3_REQ PHY4_REQ

i

P\LIND

PHY3

IPHY2JND I PHY3JNDl PHY4_IND
1

1

1

SYSJND
132 bits 13DD47FAI
TL/F/l0797-3

FIGURE 3. System Using Four PHY Layers In Parallel
4-151

~

z



LBC _ _----'

+ ___. . .

Cascado Roady _ _ _ _ _ _ _ _ _ _ _

+ __________---1

Cascado Start _ _ _ _ _ _ _ _ _ _ _

..JX'-_____-'X~__...;;...__..JX....__....;J;;..K_ _..JX~___J;;;K_ _ _>G!::

A...lnd Pert _ _ _

TL/F/10797-5

FIGURE 5a_ First PLAYER device to receive a JK symbol in a large skew scenario. The CS
signal goes high about 60 ns after the CR line Is asserted. This Indicates that some of the
channels received JK symbols more than one LBC period after the channel shown.
PWD_IND

<'____JK_ ____"X'____n_n_1_ _-'X'____n;;..n;;..2_ _-'X'____n_n;;..3_ _-'X'____n;;..n4_ _--'>

LBC _ _---'

Cascado Ready

Cascade start

------------t-----'
------------t-------~

X

A...lndPort

X

X

JK

X

nn1

~
TUF/10797-6

FIGURE 5b. First PLAYER device to receive a JK symbol In a small skew scenario. The CS signal goes
high shortly after assertion of the CR slgnal,indlcating that all of the channels received JK symbols within t4.
PMD_IND

<

JK

X

nn1

X

>

nn2

X

nn3

X

nn4

X

JK

X

nn1

~

LBC

Cascado Roady

Cascado start

X

A...lnd Port

X

TL/F/10797-7

FIGURE 5c. Last PLAYER device to receive JK symbol (in any scenario). Since this device
was the last to assert its CR line, is is due only to the delay of the wired-AND structure.
PMD_IND

<'-___JK_ ____"X'____n_n_1_ _-'X'____n_n_2_ _-'X'-___n_n3_ _--'X'____n_n4_ ____">

LBC _ _---I

+ ___-'
_ _ _ _ _ _ _ _ _ _ _ _ _ _+ ________________________________________

Cascade Ready _ _ _ _ _ _ _ _ _ _ _
Casc~eStart

JX'___..;;..__-'X~__...;;...__..JX'___....;J;;..K_ _JX. . ____...;J;;..K___.....>G!::

A...Ind Port _ _ _

TL/F/10797-8

FIGURE 5d. PLAYER device which receives JK symbol In scenario
where one or more channels never receive JK symbols.
4-153

~
~

Figure 7 illustrates the source of timing deviations between

4.0 PHY LAYER COMPONENTS

the channels and demonstrates the need to minimize timing
skews between the channels wherever possible. In Station
I, we are concerned with TXC and TBC while in Station Ii we
examine LBC, since Station I is transmitting to Station Ii.
The time parameters shown in the figure represent the maximum deviations in propagation delay between channels.
For example, if t1 were 10 ns, this would mean that TXCI
TBC could arrive at PHYI up to IOns before arriving at
PHY2.

4.1 System Block Diagram
The number of PHY layers connected together in parallel is
limited only by the timing budget of the CS line (explained in
Section 5.2) and the timing skews between channels. As an
example, a system level block diagram using four PHY layers connected together in parallel is presented in Figure 6.
All of the PHY layers within a given station are driven with a
single set of clock Signals, and all are controlled and monitored by the host system through the Control Bus interface.
Each channel has two dedicated fibers, one for transmission and one for reception. The full duplex architecture eliminates the need for complex handshaking between the two
stations. The four channels communicate through the CR
and CS signals. For simplicity, the CR lines are shown connected to a pullup resistor-a more detailed look at the connection of these pins is given in Section 6.

t1 represents the skews in TXC/TBC between the channels,
t2 encompasses the skews in the PHY layer's transmitting
path, t3 represents the differential skews amongst the fibers, I.j includes all of the skews inherent in the PHY layer's
receiving path, and ts represents the skews in LBC between
the channels in the receiving station. All of the skews together must not exceed 80 ns in order to prevent synchronization errors, and smaller total skews will provide greater
stability across temperature and power fluctuations.
In a worst case scenario where all devices were badly
skewed, t2 together with I.j yields a base 30 ns of skew
between the channels. This leaves 50 ns available for differential skews in the clock Signals and the fiber. It is recommended that t1 be held to 4 ns and ts kept under 8 ns to
prevent misclocking of the data. Hence, the maximum skew
among fibers should be less than 38 ns.

The global clock scheme should be arranged to minimize
the skews in the clock signals between PHY layers. Smaller
clock skews between channels will leave more tolerance for
device skews and fiber optic variations. For further recommendations concerning the COD device in a multiple PLAYER device environment, see the COD device datasheet
(COD Device Driving Multiple PLAYER Devices).

Vec

Contro I Bu,
Interface

/).

pullu

PHYI

..

To FOTX ...
From FORX

r

r-

TX Data
RX Data

Port A Req

.

From

rORX

,......
r

Port A Ind

Clock Inputs

JK Deloci 1
Cascade Ready
10
10

Data In
Data Out

ij
PHY2

To FOTX ...

Cascad. Start
Cascade Ready

Ca,cade Start

TX Data

Cascade start
Cascade Ready

RX Data

Port A Req
Port A Ind

Clock Inputs

Cascade Start
JK Detecl2
Cascade Ready
10
10

Data In
Data Out

j'j
....

.

To FOTX ...
From FORX

,......
r

PHY3
TX Data

Cascade Start
Cascade Ready

RX Data

Port A Req
Port A Ind

Clock Inputs

Cascade Start
JK 0elocl3
Cascade Ready
10
10

Data In
Dala Out

j'j
PHY4

....

To FOTX ....
From FORX

.-

COO
LBC
TBC
TXC

5

TX Data

Cascade Start
Cascade Ready

RX Data

Port A Req

Clock Inpuls

Port A Ind

Cascade Start
JK Detect 4
Ca,cade Ready
10
10

Data In
Data Oul

-iJ
TL/F/l0797-9

FIGURE 6. PHY Layer Block Diagram for an Example System Using Four PHY Layers In Parallel
4-154

.

~------------------------------------------------------------------~~

For example, for a typical FOOl fiber optic cable, s = 1.9 X
108 mIs, v = 0.005, and w =0.001. Solving for I with
these parameters results in a length of 667 meters.

The following equation summarizes the tradeoff between
cable length and variance:

~-~<38ns
s (1 - w) s (1 + w)

z

G'I

........

co

where: s is the speed of the signal in the cable
I is the average length of the fiber in meters
v is the variance in the length of the cable
w is the variance in the speed of the signal through
the fiber
TXC
~
COD

11

Slation I

'

,

I

I

I

I

Slation II

~

LBC

-+- 12 - - : - - 13 - . : - 14 -+- 15

H

H

PHY1:

PHY2

~

-:

PHYl

11--.
"'_1IIj1

PHY2

~--~I

~

COD

t-t--

I~__~

TUF/10797-10
Where:
t,

~

Worst case clock skew between two PHYs

t2 ~ Worst case skew between PLAYER device propagation delays

ta = Worst case skew between Fibers
t,

~

Worst case skew between PLAYER device propagation delays

t5

=

Worst case clock skew between two PHYs

Total skew = t1

+ t2 +

t3

+

t,

+ t5

Note: Total skew must not exceed 80 ns in order to prevent synchronization errors.

FIGURE 7. Origin of skew between channels. Adding all of the skews
(tl through t5) gives the total possible skew for the system.
4.2 Channel Block Diagram
Figure 8 shows the components which constitute a single
PHY channel (the COO device is common to all channels so
it is not shown here). The fiber optic transceivers are stan·
dard FOOl devices which translate electric signals to light
pulses and vice versa. The fiber optic receiver accepts data
from the fiber and sends two pairs of differential ECl signals
to the CRO device. namely signal detect and data. The CRO
device extracts a clock signal from the incoming data and
passes a resynchronized equivalent of this data and are·
covered clock signal to the PLAYER device, as well as sig·
nal detect and clock detect signals.

PLAYER device, then the Cascade Sync Error (CSE) bit will
be set in the Control Bus register RCRB by the first PLAYER
device to have recognized a JK symbol.
5.0 HOST INTERFACE CONSIDERATIONS
5.1 Data Interface
The system interface should consist of a transmit holding
register and buffer for transmission and a buffer and receive
register for incoming data. A state machine is required to
decode the symbols coming from the PLAYER device so
that only data is stored. Furthermore, a controller will be
required to monitor and manage the PLAYER device
through the Control Bus interface. This controller must han·
die the initialization of the PLAYER device and report error
conditions to the host.

Within the PLAYER device, the incoming data stream is de·
coded (from 5B to 4B) and placed in the elasticity buffer.
When in cascade mode, the elasticity buffer is used not only
to absorb variations between the received clock and the
local clock, but also to smooth out skews between incoming
data presented to the different PHY channels. If all of the
PLAYER devices receive JK symbols within 80 ns of each
other and release their CR pins, then the CS pin will go high
and all of the PLAYER devices will read from the first data
location of the elasticity buffer. This cell contains the first
byte of data received after the JK symbol. Hence, the elas·
ticity buffers facilitate the coordination of data output be·
tween the different PHY channels. If the last PLAYER de·
vice receiving a JK does so more than 80 ns after the first

Each PLAYER device takes ten bits of data at the A Request Port, a pair of 4·bit data symbols plus a parity and
control bit. (See the PLAYER device datasheet for the
PHY_MAC byte wide interface table.) The system interface
can thus generate parity and control for each PLAYER device separately and check control and parity coming from
each channel. To simplify the system interface, however,
the parity pins can be tied to ground and parity checking can
be disabled in the Current Transmit State Register (CTSR).
Parity information coming from the PLAYER device can similarly be ignored.

4·155

II

AN·679

--------------------------------------------------------------------.
Channel N
(PHY N)

I

l~~Q

PLAYER N
lJ(
lJ(

out~~~~

Data
Control

fOTX

IncomIng
Fiber

,
I

FORX

Signal Detect
RX Clock
RX Data

Data

eRD

~ I Decoding

:I

Clock Detect

Logic

I

~

Loopback Data
CRD Control

I I
A

81C

I

D

r

ElasticHy Buffer

L~~D

E

~

I

M,5

Data

10

1MUX Select

L----JI-"-;;;..;=;.;.;..1

U1
O'l

8egln
Set JK

DQ

D 8egln
DQ

~ I~
~

~
....- - -...........- - - - - - - - - '
000

~ ~ ~

Con~!~~tlon

).... Sync
Error

I r<:I....J _-

I~
"'?~'J:.

From Host
Transmit
Register

8

:
I
I
Control

I
I

Parity
Data

I
•

cascade Start

pin 47

cascade Ready

pin 48

~

'"

To Host Receive
Register

:

Control8u.
Interfaca

------------------------ --------------------'"
CDD Int.rface
(Global)

I

I
I

I

L.....,.[JK

!

Control
Parity
Data 8

TX Block

""'--'""1 Signal Detect

:

...

15

I
I
I

JK Detect

I

~
I
I

I
I

~---------------.

7

To Host Controller
TL/F/l0797-11

FIGURE 8. Block diagram of one PHY channel. The components shown here are repeated for each separate channel in the system.

In error situations, one or more PLAYER devices may report
a Cascade Sync Error, but they may not do so simultaneously depending on when they receive JK symbols. The
Cascade Sync Error (CSE) bit of the Receive Condition
Register B (RCRB) will be set by each PLAYER device
which receives a JK but does not sense the CS pin go high
before the second falling edge of LBC from when CR was
released. CS has to be set approximately within 80 ns of CR
release. If a JK symbol is completely corrupted from a line
hit or bad connection, the PLAYER device on that channel
will not report a CSE. Only the data on the channel(s) which
did not report a CSE will be corrupt, however, these are the
channels which were unable to synchronize with the rest of
the group. All of the PLAYER devices which receive a JK
symbol (and release the CR pin) will read data from the first
cell of the Elasticity Buffer. Therefore, a line hit on a single
fiber will not wipe out the entire frame. The rest of the channels may still output synchronized data. This is particularly
important in applications where partial data reception is still
useful. For example, during screen updates in high resolution graphics systems, only one line of pixels would be lost
instead of an entire block of the screen blanking out.

Thus if m is 20 pF and n is 2, the maximum pullup resistor is
5000, which meets the specification for the minimum resistor size. However, it is apparent that for many PLAYER devices a passive pullup resistor is too slow.
6.2 GAL Scheme
As a result, we recommend using external logic devices for
any system with three or more cascaded PLAYER devices.
The choice of devices is limited by the propagation delay as
well as fan in or fan out. Each CR pin should be pulled up
with a 4000 resistor and fed into the AND gate. A recommended device to perform the AND function is the
GAL16V8A chip, which offers 8 inputs and supplies 8 outputs with a propagation delay of IOns. This chip will allow
up to eight PLAYER devices to be cascaded together while
still maintaining the necessary delay, fan in and fan out
characteristics. The device should be place in the electrical
center of the cascaded devices to prevent excessive timing
skews among the chips. Figure 9 depicts an eight channel
system using the GAL16V8A to AND the CR signals together.

v

.~

5.2 Control Bus Interface
If no JK symbols are corrupted, but they arrive with more
than 80 ns of skew, all of the PLAYER devices will eventually report a CSE error. Hence the control microprocessor has
the ability to pin point the corrupted channel or determine if
the problem is due to excessive skew between the channels. Note that the Control Bus registers can be programmed to assert the interrupt (INn pin upon detection of
the CSE flag.
To place the PLAYER devices in Cascade Mode, the Mode
Register (MR) must have the Cascade Mode (CM) bit set to
one. The Cascade Synchronization Error (CSE) of the Receive Condition Register B (RCRB) is set to one if the CS
signal fails to go high within 80 ns of recognizing the JK
symbol. The RCRB also reports Elasticity Buffer errors
through the EBOU bit, signaling a loss of data from the fiber.
These bits must be cleared by the Control Bus controller.
When the number of PLAYER devices and the total capacitance is small, it may be possible to tie all CR pins and CS
pins together and use a single pullup resistor. The lower
limit of the pullup resistor is calculated as follows. The CR
pins typically sink a 13 mA maximum, so the equation for
the smallest resistor which should be used is:
RMIN = Vee/0.0130
Hence for a voltage supply of 5V, the resistor value is
5/0.013 = 3850. The upper limit of the pullup resistor depends on the capacitance of the system and the number of
PLAYER devices used. Restricting the timing budget (tb) to
20 ns (worst case) for the AND function, we arrive at the
following equation:
RMAX = tb/(m x n) 0
where: m is the capacitance associated with each PLAYER
device's CR line (including the IC capacitance (4
pF), the socket capacitance, and the trace capacitance) measured in pF
n is the number of PHY channels (number of cascaded PLAYER devices).

4-157

,. 400D.

CRLt-_+_---.

PHYl

c~ !t----+---------.
400D.

PHY2

CR I

C~ I

'.

'-'----

•
•
•
•
•

~J

r--

GAL 16V8A
Vee

;:
400D.

..

CRLt-_+_---'

PHYB

cs:L

........................................~

~

---'

TL/F/10797-12

FIGURE 9. Example of an eight channel system
using a GAL16V8A chip to perform the AND
function on the CR lines. The resulting signal (CS)
is fed bacl, Into each of the PLAYER devices.

...mr----------------------------------------------------------------------------.
High Speed, Point to Point,
r-.

o

tn

National Semiconductor
System Brief 107

Fiber, Data Communication

HOST

HOST

FIBER OP1lC CABLE

TL/F/l0857-1

Serial Polnt-to-Polnt Data Communications
SYSTEM DESCRIPTION
Point-to-Point links are needed in any application where
data throughput is the limiting factor to system performance.
They can be installed between a CPU and disk controller to
speed up information storage and retrieval times or the display capabilities of a graphics workstation can be combined
with a supercomputer to achieve visualization for data intensive simulation. Point-to-Point links can also be used in a
high-speed networking backbone where separate FOOl
rings are connected with a fiber link to provide bridging with-

out loss of performance. Fiber optics can be used to extend
SCSI or IPI transmissions. High bandwidth, greater than
100 Mb/s, pOint-to-point applications can use parallel FOOl
PHY layers. High bandwidth point-to-point solutions prove
parallel FOOl PHY layers to be cost effective, simple systems with minimal logic, and requiring only standard FOOl
fiber optic transceivers (which operating at 125 MHz, are
less expensive than a GHz laser).

System Block Diagram: Two Parallel PHY Layer In Cascade Mode

__

CONTROL BUS INTERFACE

L..--._~~

pullup
PLAYER 1
Cosoade Start
-I1J( Data
Cosoade Start
JK Delect 1
Cosoade Ready I-:Co:-so-ad-:-e-=R:-e.--d:-y......

t----+-+---tlRX Data

PortA Roql+--...,.S"-+-Data In
Pori A Ind
S
Data Oul

200Mb!.

fiber Optic
Link

PLAYER2 Co

~""'''''_''-I1J( Data
RX Data

d start Coscade Start
soa 0
1-:,..........,...-=-.......---1 JK Delect 2
Coscade Roady Coscade Roady
Port A Req
PortA Ind

S
S

Data In
DataOui

CDD

LBC
TBCI-~'"
1J(C

TLlFI10857-2

4-158

DESIGN CHALLENGES

1. Need for high bandwidth, high throughput, and high reliability.
2. Need to interface with a variety of system applications
and maintain security and reliability.
KEY COMPONENTS
1. Clock Distribution Device (CDDTM) provides the clocks
needed for the PLAYERTM device and the host if needed. It provides 125 MHz differential ECl signals from an
inexpensive 12.5 MHz crystal.

2. Physical layer Controller Device (PLAYERTM) performs
the encoding and serialization of transmitted data, and
deserialization and decoding of received data. It is compatible with 48/58 and NRZI transmission code, and
supports both Single and dual attach station configurations.
3. Clock Recovery Device (CRDTM) extracts the clock signal from incoming data and passes a resynchronized
equivalent and a recovered clock signal to the PLAYER
Device.
4. Transceiver provides electrical to light conversions.

BilL OF MATERIAL
Function

Description

Decoding

PLAYER

Clock Recovery

NSC

Other Mfg.

Qty

DP83251/55

2

CRD

DP83231

2

Clock Distribution

CDD

DP83241

Transceiver

FOTX
FORX

AND Function

GAL

2

2
GAl16V8A

1-8

II
4-159

....

N.---------------------------------------------------~====::l

National Semiconductor
System Brief 112

;i; FOOl Concentrator
rn

FOOl Applications

FOOl TO
FOOl
BRIOG!:

FOOl TO
ETHERNET
BRIDGE

FOOl F1I0NTINO

TUF/11005-1

SYSTEM DESCRIPTION
The Concentrator plays an important role in the Fiber Distributed Data Interface (FDDI) architecture. FDDI offers a
whole range of network topology alternatives. The concentrator simplifies the wiring of networks and allows logical
ring topologies to be created from the typical star wiring
configuration. The concentrator provides a very reliable and
economic method of obtaining fault tolerance. The concentrator provides drops to individual nodes in order to include
them in the network. When the concentrator senses a failure on one of the drops, it 'heals' the ring by electronically
bypassing that station. Properly designed concentrators can
bypass any number of drops with no degradation in performance.
The concentrator is an extremely chip intensive system. The
small footprint, low power consumption, and special bridging features provide the ideal solution for concentrator applications. Concentrators are ideal for the needs of interconnectivity as addressed through high performance FDDI networks.

KEY DESIGN CHALLENGES
Management Software
Developing the Network Management software to manage
all aspects of the concentrator and participate in the network management protocols is not a trivial task. The concentrator is also the best location for network diagnostic
support including network monitors.
Modular Design
Keeping the design modular, while maintaining its manageability and flexibility, can save design time and manufacturing
costs. Key to the architecture is to provide high throughput
and flexibility to interface to a variety of system configurations.
In a multiboard design several other design challenges are
present including other clock distribution, multi-processor
communication, and backplane design issues.
Clock Distribution
Each port within a concentrator requires 125 MHz and
12.5 MHz clocks; the distribution of these clocks is not a
Simple task; the CDD device provides an elegant solution.

4-160

System Diagram
HETWORI( WONITOR

-OR-

~

TO TR1JHX """

!

~

10 STATlOM

TO STATION

TO STATION

TO STAmM

TLlF/11005-2

Single Board Concentrator Design

U~·8S

iii

N

.,....
.,....

iii
(/)

CDDTM

KEY COMPONENTS
PLAYERTM (Physical Layer Controller) device converts the
BMAC device Mby1e stream into an encoded bit
stream as specified in the FDDI PHY standard.
It synchronizes the received bit stream to the
local clock and decodes the 4B/5B data into
internal code. The PLAYER device also contains a configuration switch for use in dual attachment stations and concentrators.
BMACTM (Basic Media Access Controller) device implements the functions defined by the ANSI
X3T9.5 FDDI Media Access Control (MAC)
standard. The device consists of the transmit
and receive state machines, an address magnitude compare unit, a CRC generator and checker, protocol timers, and diagnostic counters.

(Clock Distribution Device) device generates
the clocks required by the PLAYER and BMAC
devices, one per board.
(Clock Recovery Device) device extracts specific incoming clock data from the upstream station. Its features include on-chip loopback control, crystal control, the ability to lock to a master line state in less than 100 P.s, and a single
+5V supply.

CRDTM

NS32GX32
or HPC
Performs the control interface with fast and flexible 1/0 control, efficient data manipulation, and
high speed computation.

BILL OF MATERIAL
Function

Description

Part No.

Quantity

Controller
Controller
Clock Distribution
Clock Recovery
Controller or
Processor
Logic
RAM

BMAC
PLAYER
CDD
CRD
HPCor
GX
PAL
8k DRAM or
16kSRAM
+5VSupply

DP83261
DP83251 155
DP83241
DP83231
HPC16400
NS32GX32

1/2

Power

4-162

4
1(4)
4
1
1
1
1
1
1

.

en

m
......
......

National Semiconductor
System Brief 115

An FODI-Ethernet Router

U1

ETHERNET LAN

COMPUTERS/
TERMINALS

ROUTER

FILE
SERVER

TL/F/11047-1

FIGURE 1. A Router Configuration in a Typical Network
SYSTEM DESCRIPTION
A router connects multiple networks and routes packets between them. Figure 1 illustrates a typical router configuration. Here, a dual attach FDDI node and four Ethernet ports
enable the router to interconnect an FDDI ring and up to
four Ethernet LANs. The FDDI and Ethernet interfaces are
implemented using high performance peripherals: the
DP83200 FDDI chip set and the DP83932 Systems Oriented
Network Interface Controller (SONICTM).
TCP/IP is an industry standard for networking and many
routers implement the IP protocol. The router presented
here implements TCP/IP in full, providing reliable routing of
packets across multiple networks. In doing so it offers such
services as confirmation of packet delivery, packet routing

and fragmentation, error reporting, address filtering and so
on. Such a software intensive application requires a highly
integrated, high performance embedded processor and
therefore the NS32GX320 was chosen.
Figure 2 illustrates the router architecture. It consists of two
32-bit wide buses that separate network traffic from the
processor bus activity. Each contains a 4/16 Mbyte bank of
DRAM: one for the GX320 to run it's application software
and the second for buffering received packets and queuing
new ones to be transmitted.

In addition, there is a third "bus" for accessing the FDDI
chip set registers and all the 8-bit system devices, such as
EPROMs, an EEPROM, a UART and a SCSI controller.

4-163

r--------------------------------------------------------------------------------....
....
U)

cD

U)

TO ETHERNET LANS

TLlF/11047-2

FIGURE 2. The Router Block Diagram
KEY COMPONENTS
a. DP83200 FOOl Product.
Includes: BSI, BMAC, PLAYER, CRD, COD Devices and
SMT software. The FOOl chip set fully implements a 32bit wide system interface, all MAC (Media Access Control) functions and the physical layer interface to the fiber
optic ring. The FOOl Product also includes FOOl SMT
software.
b. DP83932 SONIC
The Systems Oriented Network Interface Controller provides a 32-bit wide system interface, implements all MAC
functions and includes an ENDEC (Encoder-Decoder) for
the serial interface to an Ethernet transceiver.
c. NS32GX320
The GX320 is a highly integrated, high performance embedded system processor designed for compu1ation intensive applications. It incorporates a four stage instruction pipeline, on chip instruction and data caches and a
hardware multiplier unit. The internal organization allows
for a high degree of parallelism in instruction execution.
Integrated on the same chip with the CPU are also two
channel DMA controller, a fifteen level Interrupt Controller Unit and three 16-bit timers.

DESIGN CHALLENGES
Throughput and Bandwidth Considerations
A router must be able to process frames arriving at a peak
rate of 100 Mbits/sec over the FOOl ring and 10 Mbits/sec
on each of the four Ethernet LANs and then route them
back onto the network with minimum latency. This is
achieved using the above architecture and National Semiconductor's advanced chips.
Application Software
The application software plays a dominant role in a router.
The software design consists of a router program and TCPI
IP protocol (compatible with BSD UNIX 4.3 implementations
of Routed and TCPIIP, respectively), buffer management
and device drivers. Also included is FOOl SMT (Station
Management) software. All these modules must run coherently to produce high performance and throughput.
Future Expansion
The router's design accommodates future enhancement
and expansion. It may also serve as a hardware platform for
other applications such as a multiple network file server or a
network printer interface.

a

BILL OF MATERIALS
Description

Function

Part No.

Quantity

System Processor

Embedded Controller

NS32GX320

1

Controller

BSITM

DP83265

1

Controller

BMACTM

DP83261

1

Controller

PLAYERTM

DP83255

2

Clock Recovery

CRDTM

DP83231

2

Clock Distribution

CDDTM

DP83241

1

Controller

SONIC

DP83932

Memory

4/16 Mbyte Bank of DRAM

2

Logic

PAL4Ds/GAL4Ds
Octels

17
12

Optical

Transceivers

2

Power

+5V, + 12V, -12V

1

4-164

1

.

(/)

m
.....
.....

National Semiconductor
System Brief 116

FOOl-Adapter Card

CD

roDI BACK END
DISK

CONTROLLER

fOOl TO
fOOl
BRIDGE

roor TO
ETHERNET

CONCENTRATOR

BRIDGE

TlIF/l104B-l

FIGURE 1. System Diagram of Adapter Cards Found in WS/PCs and the Concentrator
SYSTEM DESCRIPTION
Computer vendors have unique system architectures like
countries of the world have different languages. The goal of
an FOOl adapter card is to bridge the "language barrier"
between the host and an FOOl network in a speedy and
efficient manner. Choosing the interface that best fits the
application is the key to achieving this goal.
The National Semiconductor FOOl chipset provides a simple but powerful interface that can deliver the potential
bandwidth of an FOOl network to a wide variety of system
architectures. This interface gives the designer the flexibility
to define systems which require high network bandwidth
with minimal latency or systems in which footprint size and
system cost are the most important constraints.
An example of the need for a high bandwidth network can
be found in a factory environment. Such a network would be
responsible for tying together time critical tasks in a highly
reliable manner. An FOOl network, which is fiber based and
inherently reliable, is ideally suited for this application. The
interface from the FOOl network to the system host must
provide low latency and high throughput. With the National
Semiconductor FOOl chipset, it is possible to connect di-

rectly to the system bus as a bus master with a peak bandwidth of 96 megabytes per second. In this configuration, the
constraints of the design are met with a solution that is efficient and requires little or no external logic.
Workstations that pack supercomputer power, fit into a footprint that fits on a desktop, and cost under $10,000 are
leading edge example of the evolutionary growth of computer technology. This ability to process information at break
neck speeds has increased the need for high bandwidth,
cost effective networking solutions that can effectively connect these systems. Features of the National Semiconductor chipset allow the designer to tailor the network interface
to satisfy constraints imposed by the host architecture. For
example, the chipset may be connected directly as a bus
master on the system bus or through shared memory which
may use low-cost ORAMs or faster SRAMs. Bit ordering and
high-speed protocol processing are also handled by the National Semiconductor FOOl implementation. Additionally,
the chipset can easily be used to implement an FOOl concentrator which delivers the power of FOOl at a lower cost
by reducing the number of networking ICs built into each
end station.

4-165

•

~r-----------------------------------------------------------~
..-

m

BUFFER
MEMORY
64k x 32
.t.

?AI~--------------~"

...; !:rr'f---;::=::=;---v'il'

PC-AT
BACKPLANE

AT
INTERFACE

r--~~-.......I--.JI LOCAL L-----.
____ SYSTE~~~;ERFACE rr 1 OSCILLATOR .-----ro
(BSI)

1+-+

DP83265
ARBITER

r+
...

CLOCK
DISTRIBUTION
DEVICE
(CDD)
DP83241

1---1.....

7'

.... 7"
PHYSICAL

L.. LAYER CONTROLLER
--.

... ".

BASIC MEDIA ACCESS . ._ _ _ _ _ _+1
CONTROLLER
(BMAC)
DP83261
... ~

I PROM
I TIMER

j+-.

CONTROL BUS

j+-.

-(PLAYER)
DP83251/55

CLOCK
RECOVERY
DEVICE
(CRD)
DP83231

1

TO FIBER OPTIC TRANSCEIVER
TLlF/ll048-2

FIGURE 2. Example of AT Based FOOl Adaptor Card
KEY C~MPONENTS
DP83261 Basic Media Access Controller (BMACTM Device)
DP83255/51 Physical Layer Controller (PLAYERTM Device)
DP83231 Clock Recovery Device (CRDTM Device)
DP83241 Clock Distribution Device (CDDTM Device)

MAJOR CHALLENGES
1. Choice of an FDDI implementation
A successful adapter card design must first start with the
best FDDI solution. The National Semiconductor FDDI
chipset offers a full-featured and complete solution.

The four devices listed above compose an FDDI-compliant,
full-featured networking solution. The solution offers a fullduplex data pipe that delivers maximum FDDI bandwidth.
Additional features include a thorough SMT interface and
provisions for the straight forward design of bridges, routers,
and concentrators.

2. Design of the network/host interface
The design of an FDDI interface must eliminate data "bottle necks without demanding excessive design complexity or component count. The National Semiconductor
FDDI chipset provides full FDDI bandwidth through a simple but powerful system interface. This interface can be
tailored to create an optimal interface to a variety of system architectures.

DP83265 BMAC System Interface (BSITM Device)
The BSI provides a simple but powerful system interface.
The architecture can be connected directly to the host bus
as a bus master or connected to the host through a shared
memory -architecture which uses low-cost DRAMs or faster
SRAMs.

3. Future Integration
In order to maintain a leadership position in FDDI networking, an FDDI vendor must follow the same evolutionary path on the performance/value curve that has been
defined by the computer industry. National Semiconductor has developed an aggressive strategy to provide the
user with a consistent interface to work with while driving
toward a one chip FDDI solution.

4-166

.----------------------------------------------------------------------.~

BILL OF MATERIAL
Function

Description

Part No.

Quantity

System I/F

BSI

DP83265

1

Controller

BMAC

DP83261

1

Controller

PLAYER

DP83251/55

1

Clock Recovery

CRD

DP83231

1

Clock Distribution

CDD

DP83241

1

SMT Node Processor

Embedded Controller

HPC46003

1

SMTTimer

Real Time Clock

DP8570A

1

Memory

DRAM/SRAM
PROM

(if necessary)

Logic

PALS/GALS
Octels

(if necessary)
(if necessary)

Fiber Optic Transceivers

125 MHz RX/TX

4-167

1

2

'P
.....
.....
G)

Section 5
Appendixl
Physical Dimensions

II

Section 5 Contents
FOOl and Networking Acronyms. . . • . . . . . . . • . • . . . . . . . • . . . . . . • . . . . . . . . . . . . . . . . . . . . . . . . .
Glossary of Terms for FOOl. . . . . . . . . . . . . . . . . . . . . . • . . . . . . . . . . . . . . . • . . . . . • . . . . . . . . . . . . .
Physical Dimensions............................................... .................
Bookshelf
Distributors

5·2

5·3
5·4
5·7

FOOl and Networking Acronyms
Description

Acronym

Acronym

Description

ALS

Active Line State

LSU

Line State Unknown

ANSI

American National Standards Institute

MAC

Media Access Control Layer

BMAC

Basic Media Access ControllerPart of National's Solution

MIB

Management Information Base

BMAC System InterfacePart of National's Solution

MIC

Media Interface Connector

MLS

Master Line State

BSI
CCE

Configuration Control Element

MPM

MAC Placement Management

CDD

Clock Distribution DevicePart of National's Solution

NFS

Network File System

NIF

Neighborhood Information Frame

CFM

Configuration Management

NLS

Noise Line State

CMT

Connection Management

NRZ

Non-Return to Zero

CRC

Cyclic Redundancy Check

CRD

Clock Recovery DevicePart of National's Solution

NRZI

Non-Return to Zero Invert on Ones

OSI

Open Systems Interconnection

CSMAlCD Carrier-Sense Multiple
Access with Collision Detection

PCM

Physical Connection Management

PDU

Protocol Data Unit

DA

Destination Address

PHY

Physical Layer

DAC

Dual Attach Concentrator

PLAYER

DAS

Dual Attach Station

Physical Layer ControllerPart of National's Solution

DLL

Data Link Layer

PMD

Physical Medium Dependent Layer

ECM

Entity Coordination Management

QLS

Quiet Line State

Fe

Frame Control

RMT

Ring Management

FCS

Frame Check Sequence

SA

Source Address

FDDI

Fiber Distributed Data Interface

SAS

Single Attach Station

FTP

File Transfer Protocol

SDU

Service Data Unit

HLS

Halt Line State

SMT

Station Management

IEEE

Institute of Electrical and Electronic Engineers

SNMP

Simple Network Management Protocol

ILS

Idle Line State

TCPIIP

ISO

International Standards Organization

Transmission Control
Protocollinternet Protocol
Token Holding Time

LAN

Local Area Network

THT

LCT

Link Confidence Test

TNE

Noise Events Timer

LED

Light Emitting Diode

TRT

Token Rotation Timer

LEM

Link Error Monitor

TVX

Valid Transmission Timer

LLC

Logical Link Control

WAN

Wide Area Network

5-3

.~National

~ Semiconductor

Glossary of Terms for FOOl
(listed alphabetically)
4B/5B: The symbol coding method specified by the FOOl
standard where each set of four bits is encoded as five bits
as compared with the Manchester coding method which requires eight bits of coding for each four bit set.

Concentrator: A Node on the FOOl ring, which in tum provides connections for multiple FOOl stations so that they
may communicate with other attachments to the FOOl ring.
A concentrator has at least two Physical Layer entities and
mayor may not have one or more Oata Link Layer entities. It
provides a logical star topology while stations are physically
connected as a ring. The concentrator (or center of the star
topology) can actively bypass a station connected to it.
Connection Management (CMT): That portion of the Station Management (SMn function that controls network insertion, removal, and connection of PHY and MAC entities
within a station.

ANSI: The American National Standards Institute. They are
responsible for setting many standards, including FOOl.
Asynchronous: A class of data transmission service
whereby all requests for service contend for a pool of dynamically allocated ring bandwidth and response time.
Attenuation: Level of optical power loss expressed in units
of dB.
Average Power: The optical power measured using an average reading power meter when the FOOl station is retransmitting a stream of Halt symbols.

Connector Plug: A device used to terminate an optical conductor(s) cable.
Connector Receptacle: The fixed or stationary half of a
connection that is mounted on a panel/bulkhead. Receptacles mate with plugs.
Dual Attachment Concentrator (OAC): A concentrator
that offers two attachments to the FOOl network which are
capable of accommodating a dual (counter-rotating) ring.

Backbone Network: A network which interconnects networks via gateways, bridges, and concentrators.
Back End Network: A network which interconnects mainframe computers to high performance mass storage devices, high speed controllers and file servers.
Bandwidth: The level of communication capability of a
transmission link. The greater the bandwidth, the greater
the volume of information the link can carry in a given time.

Dual Station (or dual attachment station): A station that
offers two attchments to the FOOl network which are capable of accommodating a dual (counter-rotating) ring. It may
offer additional attachments (see concentrator).

BEACON Frame: Frame sent during the BEACON process
to indicate and recover from a break in the ring.

Entity: An active element, or functional agent, within an
Open System Interconnection (051) layer, or sublayer, or
SMT, in a specific station, including both operational and
management functions.
Extinction Ratio: The ratio of the low, or off optical power
level, (PL) to the high, or on optical power level, (PH) when
the station is transmitting a stream of Halt symbols.
Extinction Ratio (%) = (PL/PH) °100

Bit: A single character of a language having just two characters, as either of the binary digits 0 or 1.
Bypass: The ability of a station to be optically isolated from
the network while maintaining the integrity of the ring.
Cable Plant: This term refers to the installed cabling, connectors, splices and patch panels within a given plant.
Carrier Source: The component of a fiber optic system
which generates the light wave, or carrier, on which information is transmitted. e.g., LEOs or LOs.

FOOl: Fiber Oistributed Oata Interface.
Fiber: Oielectric material that guides light; waveguide.
Fiber Optic Cable: A jacketed fiber(s).

Capture: The act of removing a Token from the ring for the
purpose of Frame transmission.

Fiber Optics: A technology whereby signals are transmitted
over an optical waveguide medium through the use of lightgenerating transmitters and light-detecting receivers.

Center Wavelength: The average of the two wavelengths
measured at the half amplitude points of the power spectrum.
CLAIM Frame: Frame sent during the CLAIM process
whereby one or more stations bid for the right to initialize
the ring.

Frame: A Protocol Oata Unit (POU) transmitted between cooperating MAC entities on a ring, conSisting of a variable
number of octets.
Front End Network: A network which interconnects workstations, word processors, personal computers, facsimiles,
terminals, and printers.

Code-Bit: The smallest Signaling element used by the Physical Layer for transmission on the medium.
Code Group: The specific sequence of five code bits representing an FOOl symbol.

5-4

Multlmode: An optical fiber which allows the signal carrying
light to travel along more than one path.
Network: A set of communication channels interconnecting
several or many locations.

Hub: An active fiber optic device which allows multiple connections. Signals are transmitted on all connections or
ports. Signals are not retimed.
IEEE: The Institute of Electrical and Electronic Engineers
(American). They are active in setting lAN standards. It has
established a number of technical committees, prefixed by
IEEE 802 (e.g., 802.3, 802.5, 802.6).
Interchannel Isolation: The ability to prevent undesired optical energy from appearing in one signal path as a result of
coupling from another signal path: cross talk.
Jitter, Data Dependent (DDJ): Jitter that is related to the
transmitted symbol sequence. DDJ is caused by the limited
bandwidth characteristics and imperfections in the optical
channel components. DDJ results from non-ideal individual
pulse responses and from variation in the average value of
the encoded pulse sequence which may cause base-line
wander and may change the sampling threshold level in the
receiver.
Jitter, Duty Cycle Distortion (DCD): Distortion usually
caused by propagation delay differences between low-tohigh and high-to-low transitions. DCD is manifested as a
pulse width distortion of the nominal baud time.
Jitter, Random (RJ): RJ is due to thermal noise and may
be modeled as a Gaussian process. The peak-peak value of
RJ is of a probabilistic nature and thus any specific value
requires an associated probability.
LAN: A local Area Network is a communications network
that provides interconnection of a variety of data communicating devices within a small area (e.g., a single site or
group of buildings).
lED: A Light Emitting Diode is an electrical component
which produces light when stimulated by electricity. It is
commonly used as a method for transmitting infra-red light
along an optical fiber.

Node: A generic term applying to any FDDI network attachment (station, concentrator, or repeater).
Nonrestricted Token: A Token denoting the normal mode
of asynchronous bandwidth allocation, wherein the available bandwidth is time-sliced among all requesters.
Nonreturn to Zero (NRZ): A technique in which a polarity
level high, or low, represents a logical "1" (one), or "0"
(zero).
Nonreturn to Zero Invert on Ones (NRZI): A technique in
which a polarity transition represents a logical "1" (one).
The absence of a polarity transition denotes a logical "0"
(zero).
Numerical Aperture (NA): The sine of the radiation or acceptance half-angle of an optical fiber, multiplied by the refractive index of the material in contact with the exit or entrance face.
Octet: A data unit composed of eight ordered bits (a pair of
data symbols).
Optical Fall Time: The time interval for the falling edge of
an optical pulse to transition from 90% to 10% of the pulse
amplitude.
Optical Reference Plane: The plane that defines the optical boundary between the MIC Plug and the MIC Receptacle.
Optical Rise Time: The time interval for the riSing edge of
an optical pulse to transition from 10% to 90% of the pulse
amplitude.
OSI: The Open Systems Interconnect is an objective designed to obtain the most effective internetworking. Namely,
it allows different devices to communicate without regard to
the manufacturer. It is obtained by adhering to appropriate
international standards throughout the system.
Physical (PHy): The Physical layer responsible for delivering a symbol stream produced by an upstream MAC Transmitter to the logically adjacent downstream MAC Receiver
in an FDDI ring.
'

llC: logical Link Control (IEEE 802.2) is the part of the ISO
7 layer model which is responsible for contrOlling the flow of
information over the link between stations.
logical Ring: A network which is treated logically as a ring
even though it may be cabled as a physical star topology.
Media Access Control (MAC): The Data Link layer (Dll)
responsible for scheduling and routing data transmissions
on a shared medium local Area Network (LAN) (e.g., an
FDDI ring).

Physical Connection: The full-duplex physical layer association between adjacent PHY entities (in concentrators, repeaters, or stations) in an FDDI ring, i.e., a pair of Physical
Links.

Media Interface Connector (MIC): An optical fiber connector which connects the fiber media to the FDDI attachment.
The MIC consists of two halves. The MIC plug is the male
half used to terminate an optical fiber signal transmission
cable. The MIC receptacle is the female half which is associated with the FDDI attachment.

Physical link: The simplex path (via PMD and attached
medium) from the transmit function of one PHY entity to the
receive function on an adjacent PHY entity (in concentrators, repeaters, or stations) in an FDDI ring.
Physical Medium Independent (PMD): The portion of the
FDDI protocol which provides the digital baseband pOint to
point communication between stations in the FDDI network.
It specifies the point of interconnection requirements for
conforming station and cable plants (i.e., optical power budget, MIC receptacle mating, optiC cable specifications, and
services provided to the PHY and SMT layers).

MIC Plug: The male half of the MIC which terminates an
optical signal transmission cable.
MIC Receptacle: The fixed or stationary female half of the
MIC which is part of an FDDI station.
Modulator: The component of a fiber optic system which
converts the electrical message into the proper format.

5-5

Station: An addressble'logical and physical node on an
FOOl ring capable of transmitting, repeating and receiving
information.

Primitive: An element of the services provided by one entity
to another.
Protocol Data Unit (PDU): Information delivered as a unit
between peer entities that may contain control information,
address information, and data (e.g., a Service Data Unit
(SOU) from a higher layer) or any combination of the three.
The FOOl MAC PO Us are Tokens and Frames.

Station Management (SMT): The supervisory entity within
an FOOl station that monitors station activity and exercises
overall appropriate control of station activity.
Symbol: The smallest signaling element used by the Data
Link Layer (OLL). The symbol set consists of 16 data symbols and 8 control symbols. Each symbol corresponds to a
specific sequence of code bits (code group) to be transmitter by the Physical Layer.

Receive: The action of a station of accepting a frame, token, or control sequence from the medium.
Receiver: An optoelectronic circuit that converts an optical
signal to an electrical logic signal.

Synchronous: A class of data transmission service whereby each requester is preallocated a maximum bandwidth
and guaranteed a response time not to exceed a specific
delay.

Repeat: The action of a station in receiving a code-bit
stream (e.g., frame or token) from an upstream station and
placing it on the medium to the next station. The station
repeating the code-bit stream examines it and may copy it
into a buffer and modify control indicators as appropriate.

TCPIIP: A widely used de facto standard transport/network
protocol. It requires a Type Field when carried over Ethernet
V2 networks.

Repeater: An FOOl node that minimally comprises the functionality of two PMOs and provides only a repeat function. A
repeater does not have any MACs or concentrator functionality.

Token: An explicit indication of the right to transmit on a
shared medium. On a Token Ring, the Token circulates sequentially through the stations in the ring. At any time, it may
be held by zero or one station. FOOl uses two classes of
Tokens: restricted and non-restricted.

Restricted Token: A Token denoting a special mode of
asynchronous bandwidth allocation, wherein the bandwidth
available for the asynchronous class of service is dedicated
to a single extended dialogue between specific requesters.

Topology: The layout or configuration of a network. The
principal network topologies !ire star, bus, and ring.

Ring: Two or more stations connected by a physical medium wherein information is passed sequentially between active stations, each station in turn examining or copying the
information, finally returning it to the originating station.

Transmit: The action of a station that consists of generating
a frame, token, or control sequence, and placing it on the
medium to the next station.

Ring Management: The part of SMT which ensures the
integrity of unique addresses on the FDOI ring.

Transmitter: An optoelectronic circuit that converts an
electrical logic signal to an optical Signal.

Service Data Unit (SOU): The unit of data transfer between
a service user and a service provider.
Services: A set of functions, or services, provided by one
OSI.layer or sublayer entity, for use by a higher layer or
sublayer entity or by management entities.

TTRT: The Target Token Rotation Time is the target time
for the token to pass every FOOl node in the token path.
WAN: A Wide Area Network is a network that uses links
provide by the postal, telegraph, and telephone (PT&T) administrations and usually connects disperse locations (e.g.,
greater than 50 miles).

Singlemode: An optical fiber which allows the Signal carrying light to travel along only one path. It is also called monomode.

Wavelength: A measurement of the length of any electromagnetic wave. The shorter the wavelength, the higher the
frequency.

SlngleAHachment 'Concentrator (SAC): A concentrator
that offers one attachment to the FOOl network.

Workstation: An end user device typically comprised of
high resolution screens, local graphics proceSSing, keyboard, pointing device, and network connection.

Single Station (or Single Attachment Station): A station
that offers one attachment to the FOOl network.

X3T9.5: The ANSI committee responsible for specifying the
FOOl standard.

Spectral Width, Full Width Half Maximum (FWHM): The
absolute differenc!l between the wavelengths at which the
spectral radiant intensity is 50.0 percent of the maximum
power.

Sources
1. ANSI X3T9.5 Protocol Documents for PMO, PHY, MAC
and SMT Layers.

ST: One type of connector used for terminating optical fibers.

2. BICC Booklet "FOOl, Business Communications for the

Star: A network configuratio!1 where all th~ nodes are connected to one common central pOint via individual cables.

1990's".
3. Handbook of Computer Communications Standards, V2
(W. Stallings).

5-6

~National

~ Semiconductor

All dimensions are in inches (millimeters)

28 Lead Plastic Chip Carrier (V)
NS Package Number V28A

r

l [UpJ:AL
B&PACESAT
0.050
11.270)

O.lSO
13.302)

-+8 SPACES AT

VIEW

A·A

~~
11.143)
x45°

0.165-0.1ID

~

* *
~
10.660-0.813)
TYP

t

t~
12.842-2.9971
V28AIREVG)

84 Lead Plastic Chip Carrier (V)
NS Package Number V84A
..!U!!.::!J.!!
(2.642-2.991)

1{j::
ND•

..!J!!!.

IZ9.211

LEADNO.1IDENT
0.060

i1.ffii
IlIA

L:...

.!:!!!.=!!!!.

5-7

o

.§
5i

r-------------------------------------------------------------------------------~

132 Lead Plastic Quad Flatpack (VF)
NS Package Number VF132A

E

is

11

I

l

O.950±O.OO3

1.I00±O.OO3

ii4.iffiijij

iffiiillii

PlNNl

d'OENT

JW

1+---------~2:~103=;°O:-----------+I

ITJ
__J'-_ 13". ~OO~!:::;

1*1 :3~®H A®I B®I

VF132AIREVCI

5·8

r--------------------------------------------------------------------------,
160 Lead Plastic Quad Flatpack (VF)
NS Package Number VF160A

~

::r
~

~

o
3'

1-_ _ _ _ 039X 0.0256

;0.998 _ _ _ _- /
0.650 ;25.35

CD
::I
(II

0'

::I
(II

I,

I,

1.228:1:0.018
31.20:t0.4S

----+----

o 1.102:t0.006
2B.oO:t0.15

,

I,
I
0.007:t 0.001

~ 0.18:1:0.03

r-r.;;;;;;;...---==~~~100
--l1-0.012:t0.004 1YP
0.30:t0.l0

0.024:tO.014
0.60:t0.35

1-________ 1.ll8 :t0.018
31.20:t0.4S

5-9

IA

---I

/J.....,

,.

MAX 1YP

NOTES

~National

D

Semiconductor

Bookshelf of Technical Support Information
National Semiconductor Corporation recognizes the need to keep you informed about the availability of current technical
literature.
This bookshelf is a compilation of books that are currently available. The listing that follows shows the publication year and
section contents for each book.
Please contact your local National sales office for possible complimentary copies. A listing of sales offices follows this
bookshelf.
We are interested in your comments on our technical literature and your suggestions for improvement.
Please send them to:
Technical Communications Dept. M/S 16-300
2900 Semiconductor Drive
P.O. Box 58090
Santa Clara. CA 95052-8090

ALS/AS LOGIC DATABOOK-1990
Introduction to Advanced Bipolar Logic. Advanced Low Power Schottky. Advanced Schottky

ASIC DESIGN MANUAL/GATE ARRAYS & STANDARD CELLS-1987
SSI/MSI Functions. Peripheral Functions. LSIIVLSI Functions· Design Guidelines· Packaging

CMOS LOGIC DATABOOK-1988
CMOS AC Switching Test Circuits and Timing Waveforms. CMOS Application Notes. MM54HC/MM74HC
MM54HCT/MM74HCT. CD4XXX. MM54CXXX/MM74CXXX. Surface Mount

DATA ACQUISITION LINEAR DEVICES-1989
Active Filters. Analog Switches/Multiplexers. Analog-to-Digital Converters • Digital-to-Analog Converters
Sample and Hold • Temperature Sensors. Voltage Regulators. Surface Mount

DATA COMMUNICATION/LAN/UART DATABOOK-1990
LAN IEEE 802.3 • High Speed Serial/IBM Data Communications • ISDN Components. UARTs
Modems • Transmission Line Drivers/Receivers

DISCRETE SEMICONDUCTOR PRODUCTS DATABOOK-1989
Selection Guide and Cross Reference Guides. Diodes. Bipolar NPN Transistors
Bipolar PNP Transistors • JFET Transistors • Surface Mount Products. Pro-Electron Series
Consumer Series. Power Components. Transistor Datasheets • Process Characteristics

DRAM MANAGEMENT HANDBOOK-1989
Dynamic Memory Control • Error Detection and Correction. Microprocessor Applications for the
DP8408A109A117/18/19/28/29. Microprocessor Applications for the DP8420Al21A122A
Microprocessor Applications for the NS32CG821

EMBEDDED SYSTEM PROCESSOR DATABOOK-1989
Embedded System Processor Overview. Central Processing Units • Slave Processors • Peripherals
Development Systems and Software Tools

FDDI DATABOOK-1991
FDDI Overview. DP83200 FDDI Chip Set. Development Support. Application Notes and System Briefs

F100K ECL LOGIC DATABOOK & DESIGN GUIDE-1990
Family Overview. 300 Series (low-Power) Datasheets • 100 Series Datasheets • 11 C Datasheets
ECl BiCMOS SRAM, ECl PAL, and ECl ASIC Datasheets. Design Guide • Circuit Basics. logic Design
Transmission Line Concepts. System Considerations. Power Distribution and Thermal Considerations
Testing Techniques. Quality Assurance and Reliability. Application Notes

FACTTM ADVANCED CMOS LOGIC DATABOOK-1990
Description and Family Characteristics • Ratings, Specifications and Waveforms
Design Considerations • 54AC174ACXXX • 54ACT/7 4ACTXXX • Quiet Series: 54AC0174ACQXXX
Quiet Series: 54ACTQ174ACTQXXX • 54FCT 174FCTXXX • FCTA: 54FCTXXXA174FCTXXXA

FAST® ADVANCED SCHOTTKY TTL LOGIC DATABOOK-1990
Circuit Characteristics. Ratings, Specifications and Waveforms. Design Considerations. 54F174FXXX

FAST® APPLICATIONS HANDBOOK-1990
Reprint of 1987 Fairchild FAST Applications Handbook
Contains application information on the FAST family: Introduction. Multiplexers. Decoders. Encoders
Operators. FIFOs • Counters. TTL Small Scale Integration • Line Driving and System Design
FAST Characteristics and Testing • Packaging Characteristics

GENERAL PURPOSE LINEAR DEVICES DATABOOK-1989
Continuous Voltage Regulators. Switching Voltage Regulators. Operational Amplifiers. Buffers. Voltage Comparators
Instrumentation Amplifiers. Surface Mount

GRAPHICS HANDBOOK-1989
Advanced Graphics Chipset. DP8500 Development Tools. Application Notes

INTERFACE DATABOOK-1990
Transmission Line Drivers/Receivers. Bus Transceivers • Peripheral Power Drivers. Display Drivers
Memory Support • Microprocessor Support • level Translators and Buffers • Frequency Synthesis. Hi-Rei Interface

LINEAR APPLICATIONS HANDBOOK-1986
The purpose of this handbook is to provide a fully indexed and cross-referenced collection of linear integrated circuit
applications using both monolithic and hybrid circuits from National Semiconductor.
Individual application notes are normally written to explain the operation and use of one particular device or to detail various
methods of accomplishing a given function. The organization of this handbook takes advantage of this innate coherence by
keeping each application note intact, arranging them in numerical order, and providing a detailed Subject Index.

LS/S/TTL DATABOOK-1989
Contains former Fairchild Products
Introduction to Bipolar logic • low Power Schottky. Schottky. TTL. TTl'-low Power

MASS STORAGE HANDBOOK-1989
. Rigid Disk Pulse Detectors. Rigid Disk Data Separators/Synchronizers and ENDECs
Rigid Disk Data Controller. SCSI Bus Interface Circuits • Floppy Disk Controllers. Disk Drive Interface Circuits
Rigid Disk Preamplifiers and Servo Control Circuits. Rigid Disk Microcontroller Circuits. Disk Interface Design Guide

MEMORY DATABOOK-1990
PROMs, EPROMs, EEPROMs. TTL I/O SRAMs. ECl I/O SRAMs

MICROCONTROLLER DATABOOK-1989
COP400 Family. COP800 Family. COPS Applications. HPC Family. HPC Applications
MICROWIRE and MICROWIRE/PlUS Peripherals. Microcontroller Development Tools

MiCROPROCESSOR DATABOOK-1989
Series 32000 Overview. Central Processing Units. Slave Processors. Peripherals
Development Systems and Software Tools. Application Notes. NSC800 Family

PROGRAMMABLE LOGIC DATABOOK & DESIGN MANUAL-1990
Product Line Overview. Datasheets • Designing with PLDs • PLD Design Methodology. PLD Design Development Tools
Fabrication of Programmable Logic. Application Examples

REAL TIME CLOCK HANDBOOK-1989
Real Time Clocks and Timer Clock Peripherals • Application Notes

RELIABILITY HANDBOOK-1986
Reliability and the Die • Internal Construction. Finished Package. MIL-STD-883. MIL-M-38510
The Specification Development Process. Reliability and the Hybrid Device. VLSIIVHSIC Devices
Radiation Environment • Electrostatic Discharge • Discrete Device • Standardization
Quality Assurance and Reliability Engineering • Reliability and Documentation. Commercial Grade Device
European Reliability Programs. Reliability and the Cost of Semiconductor Ownership
Reliability Testing at National Semiconductor. The Total MilitarylAerospace Standardization Program
883B/RETSTM Products. MILS/RETSTM Products. 883/RETSTM Hybrids. MIL-M-38510 Class B Products
Radiation Hardened Technology. Wafer Fabrication. Semiconductor Assembly and Packaging
Semiconductor Packages. Glossary of Terms. Key Government Agencies. ANI Numbers and Acronyms
Bibliography. MIL-M-3851 0 and DESC Drawing Cross Listing

SPECIAL PURPOSE LINEAR DEVICES DATABOOK-1989
Audio Circuits. Radio Circuits. Video Circuits • Motion Control Circuits. Special Function Circuits
Surface Mount

TELECOMMUNICATIONS-1990
Line Card Components. Integrated Services Digital Network Components. Analog Telephone Components
Application Notes

~ National

~ Semiconductor



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-21:37:19
Create Date                     : 2017:06:24 13:57:15-08:00
Modify Date                     : 2017:06:24 14:17:24-07:00
Metadata Date                   : 2017:06:24 14:17:24-07:00
Producer                        : Adobe Acrobat 9.0 Paper Capture Plug-in
Format                          : application/pdf
Document ID                     : uuid:56c68451-fd56-414b-9256-1860b8bdaa5d
Instance ID                     : uuid:90145fc5-ac85-514f-957c-cda1309a084d
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 560
EXIF Metadata provided by EXIF.tools

Navigation menu