[1]马超[][],丁挚[],田泽[][],等. 从设备存储器窗口遍历机制设计与实现[J].计算机技术与发展,2016,26(05):135-238.
 MA Chao[] [],DING Zhi[],TIAN Ze[][],et al. Design and Implementation of Window Traversal Mechanism of MEM Unit Accessing by Target Device[J].,2016,26(05):135-238.
点击复制

 从设备存储器窗口遍历机制设计与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年05期
页码:
135-238
栏目:
应用开发研究
出版日期:
2016-05-10

文章信息/Info

Title:
 Design and Implementation of Window Traversal Mechanism of MEM Unit Accessing by Target Device
文章编号:
1673-629X(2016)05-0135-04
作者:
 马超[1][2] 丁挚[3] 田泽[1][2] 王婷[1][2]
 1.中国航空计算技术研究所;2.集成电路与微系统设计航空科技重点试验室;3.西安现代控制技术研究所
Author(s):
 MA Chao[1] [2]DING Zhi[3] TIAN Ze[1][2] WANG Ting[1][2]
关键词:
 计算机系统总线接口从设备窗口遍历
Keywords:
 computer systemhost interfacetarget devicewindows traversal
分类号:
TP39
文献标志码:
A
摘要:
 目前基于总线接口构成的计算机系统在应用中占据主流地位,并仍将持续作为主流.随着计算机系统及应用的复杂度的不断提高,对外部存储资源的需求越来越大.然而存储资源的不断增大以及存储功能的正确与否大大增加了前期设计验证工作的难度并影响了系统的准确性.文中采用总线接口架构,提出了一种接口总线从设备存储器窗口遍历机制,具有不限制存储系统频率、不限制存储大小的优势.通过窗口更新,实现由主机对存储系统的遍历访问,在系统设计初期完成对外部存储资源功能的验证,极大提高了前端设计以及芯片测试中验证测试的准确性.
Abstract:
 The computing system based on bus-interface structure has been occupied large amount of implementation. With the huge in-creasing complexity of computing system and its application,the demand in chip-out MEM units has been increased either. However,the increasing of storage resources and storage function correcting or not significantly increases the difficulty of the preliminary design verifi-cation work and affects the accuracy of the system. A new windows traversal method in achieving the fully accessing to MEM units under the bus-interface-structure is proposed. This method allows the host device to access to MEM unit without any limitations in size of MEM unit and operation frequency. According to windows updating,implementing the traversal access to storage system by the host, completing verification of external storage resources functions in the early stage of system design,the veracity of design and completeness of verification would be enormously improving.

相似文献/References:

[1]李烈彪 李仙.计算机系统的可靠性技术[J].计算机技术与发展,2007,(11):142.
 LI Lie-biao,LI Xian.Dependability Technique of Computer Systems[J].,2007,(05):142.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.

更新日期/Last Update: 2016-09-19