I3C high data rate (HDR) always-on image sensor 8-bit operation indicator and buffer over threshold indicator
09996488 ยท 2018-06-12
Assignee
Inventors
Cpc classification
G06F13/364
PHYSICS
International classification
G06F13/00
PHYSICS
G06F13/364
PHYSICS
Abstract
A method for enabling 8-bit data word access over a protocol limited to 16-bit data word access is provided. Data may be encapsulated within the lowest 19 bits of a 20-bit number. If it is ascertained that an 8-bit data word is to be used in a system supporting only 16-bit data word access, a byte-enable indicator may be provided within a most significant bit of the 20-bit number while also allocating an 8-bit data region for transfer of the 8-bit data word. The 20-bit number may then be transcoded into a 12-digit ternary number, wherein a residual numerical region is defined as a number space by which a first numerical region defined for the 12-digit ternary number exceeds a second numerical region defined by the lowest 19 bits of the 20-bit number.
Claims
1. A method, comprising: ascertaining that a w-bit data word is to be used in a system supporting only y-bit data word access, where w and y are positive integers; encapsulating data within the lowest n1 bits of an n-bit number, where n is a positive integer and n1 is equal to or greater than y; providing a data word-size change indicator within a most significant bit of the n-bit number while also allocating a w-bit data region for transfer of the w-bit data word; and transcoding the n-bit number into a k-digit odd numerical base number, where k is a positive integer and the k-digit odd numerical base number defines a first numerical region that is larger than a second numerical region defined by a n1-bit number space, and the n-bit number is limited to a residual numerical region defined as a number space by which the first numerical region exceeds the second numerical region.
2. The method of claim 1, further comprising: transcoding the k-digit odd numerical base number into symbols for transmission over a bus.
3. The method of claim 1, wherein the residual numerical region accessed by setting the most significant bit of the n-bit number to one (1).
4. The method of claim 1, wherein the n-bit number is 20 bits long and the k-digit odd numerical base number is a ternary number that is 12 digits long.
5. The method of claim 1, wherein the most significant bit of the n-bit number is the 20th bit of the n-bit number and defines at least one 256 state regions.
6. The method of claim 1, wherein the most significant bit of the n-bit number is the 20th bit of the n-bit number and defines two (2) 256 state regions.
7. The method of claim 1, wherein the lowest n1 bits of the n-bit number includes an I3C high data rate (HDR) binary sequence.
8. The method of claim 1, further comprising: ascertaining, prior to or concurrent with a read operation, a buffer empty condition for a transmission buffer; and transmitting filler data if the buffer empty condition is ascertained, where such filler data is within the n-bit number.
9. The method of claim 1, further comprising: ascertaining an over threshold condition for a transmission buffer; and setting at least one bit of the n-bit number as an over threshold indicator to indicate the over threshold condition for the transmission buffer.
10. The method of claim 1, further comprising: writing image data captured by an image sensor to the transmission buffer, wherein the image data is included in the lowest n1 bits of the n-bit number; and sending image data from the transmission buffer to a receiving device over a control data bus according to requests from the receiving device.
11. The method of claim 1, wherein a numerical space capable of being represented by the n-bit number is larger than the first numerical region capable of being defined by the k-digit odd numerical base number.
12. The method of claim 1, wherein in a first mode of operation, the lowest n1 bits of the n-bit number encapsulate a first protocol, and in a second mode of operation, the n-bit number encapsulates a second protocol.
13. An image sensor device, comprising: an image sensor to capture image data; a transmission buffer to store the captured image data; a communication interface to couple to a single-ended control data bus according to requests from a receiving device; a control circuit coupled to the image sensor, the transmission buffer, and the communication interface, the control circuit configured to ascertain that a w-bit data word is to be used in a system supporting only y-bit data word access, where w and y are positive integers; encapsulate data within the lowest n1 bits of an n-bit number, where n is a positive integer and n1 is equal to or greater than y; provide a data word-size change indicator within a most significant bit of the n-bit number while also allocating a w-bit data region for transfer of the w-bit data word; and transcode the n-bit number into a k-digit odd numerical base number, where k is a positive integer and the k-digit odd numerical base number defines a first numerical region that is larger than a second numerical region defined by a n1-bit number space, and the n-bit number is limited to a residual numerical region defined as a number space by which the first numerical region exceeds the second numerical region.
14. The image sensor device of claim 13, wherein the n-bit number is 20 bits long and the k-digit odd numerical base number is a ternary number that is 12 digits long.
15. The image sensor device of claim 13, wherein the most significant bit of the n-bit number is the 20th bit of the n-bit number and defines at least one 256 state regions.
16. The image sensor device of claim 13, wherein the most significant bit of the n-bit number is the 20th bit of the n-bit number and defines two (2) 256 state regions.
17. The image sensor device of claim 13, wherein the control circuit is further configured to: ascertain a buffer empty condition for the transmission buffer; and transmit filler data if the buffer empty condition is ascertained.
18. The image sensor device of claim 13, wherein the control circuit is further configured to: ascertain an over threshold condition for the transmission buffer; and set at least one bit of the n-bit number as an over threshold indicator to indicate the over threshold condition for the transmission buffer.
19. The image sensor device of claim 13, wherein the control circuit is further configured to: write image data captured by an image sensor to the transmission buffer, wherein the image data is included in the n-bit number; and send image data from the transmission buffer to a receiving device over the control data bus according to requests from the receiving device.
20. A method for enabling 8-bit data word access over a protocol limited to 16-bit data word access, comprising: ascertaining that an 8-bit data word is to be used in a system supporting only 16-bit data word access; encapsulating data within the lowest 19 bits of a 20-bit number; providing a byte-enable indicator within a most significant bit of the 20-bit number while also allocating an 8-bit data region for transfer of the 8-bit data word; and transcoding the 20-bit number into a 12-digit ternary number, wherein a residual numerical region is defined as a number space by which a first numerical region defined for the 12-digit ternary number exceeds a second numerical region defined by the lowest 19 bits of the 20-bit number.
21. The method of claim 20, wherein the 20-bit number is limited the number space within the residual numerical region.
22. The method of claim 20, wherein the most significant bit of the 20-bit number serves to define a number space with at least two (2) 256 state regions.
23. The method of claim 20, wherein the lowest 19 bits of the 20-bit number includes an I3C high data rate (HDR) binary sequence.
24. The method of claim 20, further comprising: ascertaining, prior to or concurrent with a read operation, a buffer empty condition for a transmission buffer; and transmitting filler data if the buffer empty condition is ascertained, where such filler data is within the n-bit number.
25. The method of claim 20, further comprising: ascertaining an over threshold condition for a transmission buffer; and setting at least one bit of the 20-bit number as an over threshold indicator to indicate the over threshold condition for the transmission buffer.
26. The method of claim 20, further comprising: writing image data captured by an image sensor to the transmission buffer, wherein the image data is included in the lowest 19 bits of the 20-bit number, and sending image data from the transmission buffer to a receiving device over a control data bus according to requests from the receiving device.
27. An image sensor device, comprising: an image sensor to capture image data; a transmission buffer to store the captured image data; a communication interface to couple to a single-ended control data bus according to requests from a receiving device; a control circuit coupled to the image sensor, the transmission buffer, and the communication interface, the control circuit configured to ascertain that an 8-bit data word is to be used in a system supporting only 16-bit data word access; encapsulate data within the lowest 19 bits of a 20-bit number; provide a byte-enable indicator within a most significant bit of the 20-bit number while also allocating an 8-bit data region for transfer of the 8-bit data word; and transcode the 20-bit number into a 12-digit ternary number, wherein a residual numerical region is defined as a number space by which a first numerical region defined for the 12-digit ternary number exceeds a second numerical region defined by the lowest 19 bits of the 20-bit number.
28. The image sensor device of claim 27, wherein the 20-bit number is limited the number space within the residual numerical region.
29. The image sensor device of claim 27, wherein the most significant bit of the 20-bit number serves to define a number space with at least two (2) 256 state regions.
30. The image sensor device of claim 27, wherein the lowest 19 bits of the 20-bit number includes an I3C high data rate (HDR) binary sequence.
Description
DRAWINGS
(1) Various features, nature, and advantages may become apparent from the detailed description set forth below when taken in conjunction with the drawings in which like reference characters identify correspondingly throughout.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
DETAILED DESCRIPTION
(28) In the following description, specific details are given to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific detail. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, structures, and techniques may not be shown in detail in order not to obscure the embodiments.
(29) Overview
(30) A first aspect provides a method to transcode data/information between a binary number space and an odd numerical base number space (e.g., ternary, quinary, septenary, nonary, etc., number space) and utilizing an excess/residual numerical space within a k-digit odd numerical base number to encode other information (e.g., an overlay protocol, a control protocol, extended protocol, etc.) without incurring any additional digits in the k-digit odd numerical base number.
(31) A second aspect provides a method to provide 8-bit word access in a system supporting only 16-bit word access. In a system supporting only 16-bit data word access, data may be encapsulated or encoded within the lowest 19 bits of a 20-bit number. The 20-bit number may be transcoded (e.g., converted) into a 12-digit ternary number, wherein a residual numerical region is defined by a number space by which a first numerical region defined for the 12-digit ternary number exceeds a second numerical region defined by the lowest 19 bits of the 20-bit number. Additional information may be encoded within this residual numerical region without the need to add digits to the 12-digit ternary number.
(32) A third aspect provides a byte-enable indicator (e.g., indicating an 8-bit data word access instead of a 16-bit data word access within the particular 20-bit number) within a most significant bit of the 20-bit number while also allocating an 8-bit data region for transfer of the 8-bit data word.
(33) Exemplary Operating Environment
(34)
(35) The control data bus 108 may comprise two wires, for example, a clock line (SCL) and a serial data line (SDA). In I2C mode, the clock line SCL may be used to synchronize all data transfers over the data line SDA. In I3C mode, both the clock line SCL and data line SDL may be used to transmit data.
(36) In one example, the control data bus 108 may be shared (e.g., concurrently used) by the master device and the plurality of slave devices using single-ended communications/interfaces.
(37) It should be clear that the shared control data bus 108 may be capable of operating in different modes (e.g., a first mode such as I2C communications, a second mode such as I3C communications, etc.).
(38)
(39)
(40) However, the data retrieval process has the risk of underflow or overflow of the buffer (e.g., a pixel buffer, a first-in first out (FIFO) buffer, etc.) on the slave device. That is, if the data rate at which image data is retrieved from an image sensor exceeds the rate at which the image data is captured by the image sensor, then an underflow condition may occur. Likewise, if the data rate at which image data is retrieved from an image sensor is less than the rate at which the image data is captured by the image sensor, then an overflow condition may occur. Consequently, the master device needs to have a mechanism to prevent underflow and overflow of buffers for each image sensor.
(41) In the I3C protocol, high data rate (HDR) protocols are provided which support 16-bit size operations (i.e., 16-bits per word). However, there is no method or support in the I3C protocol permitting 8-bit size operations (i.e., byte-size or high/low byte access).
(42)
(43)
(44)
(45)
(46) Exemplary Transcoding Technique for Legacy Devices
(47) In order to implement the sleep/wakeup modes described above, a mechanism is needed that permits the legacy devices to receive either the sleep command/call and/or the wakeup command/call while the legacy device is sleeping (e.g., not operating). This may be accomplished by having a receiver device within the legacy device that is capable of receiving transmitted signals from the shared bus without then need for a receiver clock.
(48)
(49) In one example, an original 20-bits 804 of binary data is input to a bit-to-transition number converter block 808 to be converted to a 12-digits ternary number 809. Each digit of a 12-digits ternary number may represent a transition number. Two consecutive digits of a transition number may be the same digit value. Each digit of a transition number is converted into a sequential symbol at a transition-to-symbol block 810 such that no two consecutive sequential symbols have the same value. Because a transition (e.g., change) is guaranteed at every sequential symbol, such sequential symbol transition may serve to embed a clock signal. Each sequential symbol 816 is then sent over a two wire physical link (e.g., I2C control data bus comprising a SCL line 812 and a SDA line 814).
(50) At a receiver 820 the process is reversed to convert the sequential symbols back to bits and, in the process, a clock signal is extracted from the sequential symbol transition. The receiver 820 receives the sequential symbols 822 over the two wire physical link (e.g., an I2C control data bus comprising a SCL line 824 and a SDA line 826). The received sequential symbols 822 are input into a clock-data recovery (CDR) block 828 to recover a clock timing and sample the sequential symbols (S). A symbol-to-transition number converter block 830 then converts each sequential symbol to a transition number, where each transition number represents a digit of a ternary number. Then, a transition number-to-bits converter 832 converts twelve (12) transition numbers (i.e., a ternary number) to restore twenty (20) bits of original data from the 12 digit ternary number.
(51) The technique illustrated herein may be used to increase the link rate of a control data bus 108 (
(52)
(53) In this example for a 2-wire system using 12 symbol transition numbers, it may be assumed that the possible symbol transitions per one T, r is 3(=21). If the number of symbols in a group is 12, a 12-digit ternary number (base-3 number): T11, T10, . . . , T2, T1, T0, where each Ti: 0, 1, 2, may be used. For example, for {T11, T10, . . . T2, T1, T0}={2, 1, 0, 0, 1, 1, 0, 1, 0, 1, 2, 1}, the ternary number is:
(54)
(55) In this manner, 12 transitions numbers may be converted into a number. Note that the ternary number 2100_1101_0121.sub.3 may be used as the transition number, for example, in
(56) The example illustrated in
(57)
(58) In one example, the conversion function adds the transition number (e.g., digit of a ternary number) plus 1 to the previous raw sequential symbol value. If the addition results in a number larger than 3, it rolls over from 0, then the result becomes the state number or value for the current sequential symbol.
(59) In a first cycle 1006, a previous sequential symbol (Ps) is 1 when a first transition number (T.sub.a) 1 is input, so the first transition number 1 plus 1 is added to the previous sequential symbol (Ps), and the resulting current sequential symbol (Cs) of 3 becomes the current sequential symbol that is sent to the physical link.
(60) In a second (next) cycle 1008, a second transition number (T.sub.b) of 0 is input, and the second transition number 0 plus 1 is added to the previous sequential symbol (Ps) of 3. Since the result of the addition (0+1+3) equals 4, is larger than 3, the rolled over number 0 becomes the current sequential symbol (Cs).
(61) In a third cycle 1010, a third transition number (T.sub.c) of 0 is input. The conversion logic adds the third transition number 0 plus 1 to the previous sequential symbol (Ps) 0 to generate current sequential symbol (Cs) 1.
(62) In a fourth cycle 1012, a fourth transition number (T.sub.d) of 2 is input. The conversion logic adds the fourth transition number (T.sub.d) 2 plus 1 to the previous symbol (Ps) 1 to generate current sequential symbol (Cs) 0 (since the result of the addition, 4, is larger than 3, the rolled over number 0 becomes the current sequential symbol).
(63) Consequently, even if two consecutive ternary digits T.sub.b and T.sub.c have the same number, this conversion guarantees that two consecutive sequential symbols have different state values. Because of this conversion, the guaranteed sequential symbol change or transition in the sequence of symbols 1004 may serve to embed a clock signal, thereby freeing the clock line SCL in an I2C control data bus for data transmissions.
(64) Note that while this example of transition number to sequential number conversions adds a guaranteed number 1 to increment between consecutive sequential symbols, other values may be used in other implementations to guarantee a transition or change between sequential symbols.
(65)
(66) In one example for a 2-wire system, there are 4 raw symbols assigned to 4 sequential symbol S0, S1, S2, and S3. For the 4 sequential symbols, Table 1102 illustrates how a current sequential symbol (Cs) may be assigned based on a previous sequential symbol (Ps) and a temporary transition number T.sub.tmp based upon the current transition number (T).
(67) In this example, the transition number C.sub.s may be assigned according to:
Cs=Ps+T.sub.tmp
(68) where T.sub.tmp=T==0?3:T. Alternatively stated, if the current transition number T is equal to zero, the temporary transition number T.sub.tmp becomes 3, else T.sub.tmp becomes equal to T. And once T.sub.tmp is calculated, Cs is set to Ps plus T.sub.tmp. Moreover, on the receiver end, the logic is reversed to recover T, T.sub.tmp=C.sub.s+4P.sub.s and T=T.sub.tmp==3?0:T.sub.tmp.
(69)
(70)
(71)
(72) Exemplary 8-Bit Size Operation Indicator Using Bit 19
(73) It is observed that in converting an n-bit (binary) number to a k-digit odd numerical base number (e.g., ternary, quinary, septenary, nonary, etc.), the available numerical space represented by the k-digit odd numerical base number may exceed the numerical space needed to represent the n-bit number. Consequently, this unused numerical space within the k-digit odd numerical base number may be utilized to encode other information.
(74)
(75) For instance, in the exemplary number space illustrated in
(76) As a result of the transcoding between the 20-bit binary number and 12-digit ternary number, this excess/residual ternary numerical space/region 1504 may be available to encode or transmit other/additional information. In order to encode information in this excess/residual ternary numerical space 1504 (in the ternary number space), an extra bit may be added to the binary number space. Such extra bit may be used to represent only the excess/residual ternary numerical space 1504, which may be only a portion of the full numerical range available when the 20.sup.th bit is added (i.e., 20.sup.th bit is set to 1). For instance, in
(77) As is typical in the computer sciences, counting bitwise begins at zero (i.e., bit 0), and the 20.sup.th bit is often referred to as bit 19. As used herein, Bit19 may refer to the use of the 20.sup.th bit to represent the excess/residual ternary numerical space/region 1504, not the full numerical space possible by using the 20.sup.th bit (i.e., bit 19 set to 1).
(78)
(79)
(80) By accessing an otherwise unused numerical space in the ternary number space (e.g., the Bit19 region), additional information (e.g., protocol commands, and overlay protocol, etc.) may be encoded for transmission between devices.
(81)
(82) In one example, when an 8-bit (byte-size) operation is desired using a low byte (e.g., from the 16-bit HDR word in
(83) In this manner, whenever a device (e.g., a sensor or processor) wishes to indicate 8 bit operation (i.e., byte-size operation), it may do so by taking advantage of the excess/residual ternary numerical space created by the transcoding technique discussed in
(84) Referring again to
(85) Note that while some examples discussed and illustrated herein may refer to 8-bit (byte-size) access in a system supporting a minimum 16-bit access, it is contemplated herein that a similar method may be implemented to access w-bit data words in a system supporting only y-bit data word access (where w and y are positive integers). For instance, this method may be used to facilitate 4-bit access (i.e., a nibble) in systems supporting 8-bit, 16-bit, or 32 bit access.
(86) Exemplary Underflow and Overflow Prevention
(87) When image data is retrieved from always-on image sensors, there is the potential for buffer underflow (i.e., read operation when buffer is empty) or buffer overflow at the image sensor depending on the transfer rate used by the retrieving/receiving device (e.g., master device in
(88) When a read operation occurs, to address an underflow condition (or potential underflow condition or buffer empty condition), the image sensor may simply add a filler to its buffer whenever it becomes empty or is nearly empty (i.e., below a threshold). Alternative, instead of adding the filler data to the transmission buffer, such filler data (e.g., or equivalent transcoded symbols) may be multiplexed or otherwise inserted directly into an output channel or bus. As illustrated in
(89) To address an overflow condition, the image sensor may provide an over threshold indicator.
(90)
(91)
(92) This mechanism may serve to avoid a buffer overflow condition at the image sensor. Initially, when the image sensor issues an interrupt to the master device over the single-ended control data bus, the transmission buffer has image pixel data available. If the receiving/retrieving device (e.g., master device) retrieves the pixel data from the image sensor transmission buffer at a slower rate than the pixel data is written to the transmission buffer by the image sensor, then pixel data will accumulate in the transmission buffer. At some point, buffer may fill-up with pixel data up to or above a buffer threshold level. Such buffer threshold may be set lower than the transmission buffer size.
(93) When the transmission buffer gets filled to a threshold level, then the over threshold indicator is triggered. This indicator serves to inform the receiving/retrieving device that it needs to boost its image/pixel data retrieval rate from the image sensor. The receiving/retrieving device may then boost its image/pixel data retrieval/read rate from the image sensor until the transmission buffer level is reduced below the threshold level or below a second (lower) threshold level. At that point, once the image sensor may stop providing the over threshold indicator. In this manner, buffer overflow may be prevented.
(94)
(95) Exemplary Method and Device to Encode/Decode Information Within a Transcoded Excess/Residual Number Space
(96)
(97) For example, in
(98)
(99) In the excess/residual numerical space, additional information (e.g., for the first protocol, an extension protocol, a second/distinct protocol, etc.) may be encoded by adding/appending a most significant bit to the m-bit number (e.g., resulting in a m+1 bit number), but without adding any digit(s) to the k-digit odd numerical base number 2304. That is, for an n-bit number, where n=m+1, when the nth bit (most significant bit) is 0, the lower m bits may serve to encode data words and possibly parity information. Otherwise, when the nth bit (most significant bit) is 1 this may serve to encode the additional information in combination with a subset of other bits within the n-bit number.
(100) Note that the nth bit (in combination with a subset of the other bits with the n-bit number) may be restricted to represent numbers in the excess/residual numerical space. This permits using the same k-digit odd numerical base number.
(101) In one example, the m-bits of data may include read/write data words, an address, commands, etc., according to a first protocol. The additional bit may be appended to the m-bits of data as a most significant bit. In combination with at least a subset of bits from the m-bits of data, the additional bit (e.g., appended as a most significant bit) may serve to encode additional information (e.g., within the excess/residual numerical space), such as an extension of the first protocol (e.g., serving to add commands, data, etc., to the first protocol used within the m-bits of data), an overlay protocol (e.g., serving to add instructions, commands, control, data, etc., distinct and independent from the first protocol), and/or a control protocol (e.g., serving to provide controls over the m-bits of data). For instance, the m-bit number may be a 19-bit number and, once the additional bit is appended, it has a total of 20 bits. The k-digit odd numerical base number may be, for instance, a 12 digit ternary number. One example of the transcoding is illustrated n
(102) The k-digit odd numerical base number may then be transcoded (e.g., converted) into symbols for transmission 2306. The symbols may then be transmitted over a (two-line) data bus 2308.
(103) In one example, the nth bit (most significant bit) appended to the m-bits of data, in combination with a subset of other bits within the m-bits of data, may serve to provide a w-bit enable indicator for enabling w-bit data words (e.g., 2-bit, 4-bit, 8-bit, etc.) in a system that only supports larger (and/or possibly smaller) y-bit data words (e.g., 16-bit data words, 32-bit data words, etc.) (where w and y are different positive integers).
(104)
(105) Initially, it may be ascertained that a w-bit data word (e.g., where w is a positive integer such as 8-bits) is to be used in a system supporting only y-bit data word access (e.g., where y is a positive integer such as 16-bits) 2402. In one example, w may be a fraction (e.g., , , , , etc.) of y or less than y. Data may then be encapsulated within the lowest n1 bits of an n-bit number, where n is a positive integer and n1 is equal to or greater than y 2404. For instance, n=20 bits and n1=19 bits are used to encapsulate data (e.g., a 16-bit data word plus other information). In other instances, in a system or a protocol that does not implement/require error detection or control information, the whole n1 bits (19-bits in 12-digit ternary) can be data.
(106) In one example, illustrated in
(107) A data word-size change indicator may be provided within a most significant bit of the n-bit number while also allocating a w-bit data region for transfer of the w-bit data word 2406. For example,
(108) The n-bit number may then be transcoded (converted) into a k-digit odd numerical base number, where k is a positive integer and the k-digit odd numerical base number defines a first numerical region (e.g., space) that is larger than a second numerical region (e.g., space) defined by an n1-bit number space, and the n-bit number is limited (e.g., bound, restricted) to an excess/residual numerical region defined as a number space by which the first numerical region exceeds the second numerical region 2408. This excess/residual numerical region may be used to encode additional information. Note that the n-bit number may be restricted to representing numbers within the first numerical region, which may only represent a portion of the numerical region capable of being represented by n bits. When the nth bit is 1, the numerical space represented by the n-bit number may be restricted to the excess/residual numerical region (e.g., the numerical region by which the first numerical region exceeds the second numerical region). In this manner, no additional digits need be added to the k-digit odd numerical base number to represent at least a portion of the most significant bit of the n-bit number.
(109) The k-digit odd numerical base number may then be transcoded into symbols for transmission over a bus 2410 (e.g., a two line bus).
(110) In this manner, the residual numerical space may be used by setting the most significant bit (i.e., 1) of the n-bit number (restricted to only representing numbers within the excess/residual numerical space) without having to add more digits to the k-digit odd numerical base number. In addition to the data word-size change indicator, the residual numerical space may serve to encode additional information, such as an extension protocol, a second/distinct protocol, an overlay protocol.
(111) In one example, the n-bit number is 20 bits long and the k-digit odd numerical base number is a ternary number that is 12 digits long. According to one aspect, the most significant bit of the n-bit number is the 20.sup.th bit of the n-bit number and defines at least one 256 state region.
(112) According to one aspect, the most significant bit of the n-bit number is the 20.sup.th bit of the n-bit number and defines two (2) 256 state regions. In another example, the n-bit number includes an I3C high data rate (HDR) binary sequence.
(113) Additionally, the method may further comprise: (a) ascertaining, prior to or concurrent with a read operation, a buffer empty condition for a transmission buffer; and/or (b) transmitting filler data if the buffer empty condition is ascertained, where such filler data is within the n-bit number.
(114) Moreover, the method may further comprise: (a) ascertaining an over threshold condition for a transmission buffer; and/or (b) setting at least one bit of the n-bit number as an over threshold indicator to indicate the over threshold condition for the transmission buffer. In one example, the over threshold indicator reuses control bits encoded in n-bit number.
(115) In one example, the method may further include: (a) writing image data captured by an image sensor to the transmission buffer, wherein the image data is included in the n-bit number; and/or (b) sending image data from the transmission buffer to a receiving device over the control data bus according to requests from the receiving device.
(116)
(117) The 20-bit number may be transcoded (e.g., converted as illustrated in
(118) The 12-digit ternary number may then be transcoded into symbols (e.g., as illustrated in
(119)
(120) For instance, a data encapsulation circuit 2614 may be adapted to encapsulate data as illustrated in
(121) One or more of the components, steps, features, and/or functions illustrated in the Figures may be rearranged and/or combined into a single component, step, feature, or function or embodied in several components, steps, or functions. Additional elements, components, steps, and/or functions may also be added without departing from novel features disclosed herein. The apparatus, devices, and/or components illustrated in the Figures may be configured to perform one or more of the methods, features, or steps described in the Figures. The novel algorithms described herein may also be efficiently implemented in software and/or embedded in hardware.
(122) In addition, it is noted that the embodiments may be described as a process that is depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
(123) Moreover, a storage medium may represent one or more devices for storing data, including read-only memory (ROM), random access memory (RAM), magnetic disk storage mediums, optical storage mediums, flash memory devices, and/or other machine readable mediums for storing information. The term machine readable medium includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and various other mediums capable of storing, containing, or carrying instruction(s) and/or data.
(124) Furthermore, embodiments may be implemented by hardware, software, firmware, middleware, microcode, or any combination thereof. When implemented in software, firmware, middleware, or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine-readable medium such as a storage medium or other storage(s). A processor may perform the necessary tasks. A code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
(125) The various illustrative logical blocks, modules, circuits, elements, and/or components described in connection with the examples disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic component, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing components, e.g., a combination of a DSP and a microprocessor, a number of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
(126) The methods or algorithms described in connection with the examples disclosed herein may be embodied directly in hardware, in a software module executable by a processor, or in a combination of both, in the form of processing unit, programming instructions, or other directions, and may be contained in a single device or distributed across multiple devices. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. A storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
(127) Those of skill in the art would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
(128) The various features of the invention described herein can be implemented in different systems without departing from the invention. It should be noted that the foregoing embodiments are merely examples and are not to be construed as limiting the invention. The description of the embodiments is intended to be illustrative, and not to limit the scope of the claims. As such, the present teachings can be readily applied to other types of apparatuses and many alternatives, modifications, and variations will be apparent to those skilled in the art.