WO2012134683A2 - Activity alignment algorithm by masking traffic flows - Google Patents

Activity alignment algorithm by masking traffic flows Download PDF

Info

Publication number
WO2012134683A2
WO2012134683A2 PCT/US2012/026661 US2012026661W WO2012134683A2 WO 2012134683 A2 WO2012134683 A2 WO 2012134683A2 US 2012026661 W US2012026661 W US 2012026661W WO 2012134683 A2 WO2012134683 A2 WO 2012134683A2
Authority
WO
WIPO (PCT)
Prior art keywords
state
computing device
activity alignment
masking
traffic flows
Prior art date
Application number
PCT/US2012/026661
Other languages
French (fr)
Other versions
WO2012134683A3 (en
Inventor
William Knolla
Douglas R. Moran
Neil W. Songer
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to EP12763746.0A priority Critical patent/EP2691831B1/en
Publication of WO2012134683A2 publication Critical patent/WO2012134683A2/en
Publication of WO2012134683A3 publication Critical patent/WO2012134683A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3206Monitoring of events, devices or parameters that trigger a change in power modality
    • G06F1/3209Monitoring remote activity, e.g. over telephone lines or network connections

Definitions

  • Embodiments of the present disclosure relate generally to activity alignment algorithms, and more particularly, to methods and apparatuses for activity alignment algorithms in which traffic flows are selectively masked.
  • Fig. 1 schematically illustrates a computing device, in accordance with various embodiments of the present disclosure.
  • Fig. 2 illustrates an example timing diagram associated with an operation of the computing device of Fig. 1 , in accordance with various embodiments of the present disclosure.
  • Fig. 3 illustrates an example method for operating the computing device of Fig. 1 , in accordance with various embodiments of the present disclosure.
  • Fig. 4 schematically illustrates a block diagram of an example computer system that may be suitable for practicing some of the embodiments.
  • Illustrative embodiments of the present disclosure include, but are not limited to, methods and apparatuses for activity alignment algorithms by masking traffic flows.
  • the phrase “in some embodiments” is used repeatedly. The phrase generally does not refer to the same embodiments; however, it may.
  • the terms “comprising,” “having,” and “including” are synonymous, unless the context dictates otherwise.
  • the phrase “A and/or B” means (A), (B), or (A and B).
  • the phrase “A/B” means (A), (B), or (A and B), similar to the phrase “A and/or B”.
  • the phrase “at least one of A, B and C” means (A), (B), (C), (A and B), (A and C), (B and C) or (A, B and C).
  • the phrase “(A) B” means (B) or (A and B), that is, A is optional.
  • module may refer to, be part of, or include an
  • FIG. 1 schematically illustrates a computing device 10, in accordance with various embodiments of the present disclosure.
  • the computing device 10 may be, for example, a laptop, a cell phone, a personal computer, a mobile computing device, a personal digital assistant, a palmtop, a set-top box, an appropriate consumer electronic device, or any other appropriate type of computing device.
  • the computing device 10 may be communicatively coupled to a plurality of components 20a, 20e.
  • the plurality of components 20a, 20e may include one or more hardware/software components associated with the computing device 10.
  • Fig. 1 illustrates each of the plurality of components 20a, 20e to be external to the computing device 10, in various embodiments, one or more of the plurality of components 20a, 20e may be internal to the computing device 10.
  • the components 20a, 20e may include, for example, external devices coupled to the computing device 10, and/or devices/hardware internal to the computing device 10, including but not limited to a universal serial bus (USB) device (including devices compatible with various versions of the USB standard, e.g., USB 2.0, 3.0, etc.), a peripheral component interconnect (PCI) device, a PCI Express (PCIe) device, a network interface card, a peripheral device, a printer, a scanner, a disk drive, a camera, a network adapter, a serial advanced technology attachment (SATA), a parallel advanced technology attachment (PATA), an inter-integrated circuit (I2C), a secure digital (SD) device, a serial peripheral interface (SPI) bus, a system management bus (SMBus), etc.
  • USB universal serial bus
  • PCIe PCI Express
  • SATA serial advanced technology attachment
  • PATA parallel advanced technology attachment
  • I2C inter-integrated circuit
  • SD secure digital
  • SPI serial peripheral interface
  • SPI serial
  • the components 20a, 20e may include one or more controllers configured to control one or more devices/functions in the computing device 10, including but not limited to, a USB host controller, a memory controller, an Ethernet controller, a graphics controller, a hard disk controller (HDD), an audio controller, an advanced host controller interface (AHCI), etc.
  • the components 20a, 20e may include one or more software applications running on the computing device 10, one or more device drivers, an operating system, etc.
  • One or more of the components 20a, 20e may include (or be otherwise associated with) a corresponding buffer.
  • the component 20a may include a buffer 22a
  • the component 20b may include a buffer 22b, and so on, as illustrated in Fig. 1 .
  • a buffer associated with a component e.g., buffer 22a of the component 20a
  • a buffer associated with a component may be external to the component (e.g., included in the computing device 10 (e.g., in the receiver module 24) or located in any other appropriate place), and may be configured to buffer data packets that are transmitted to and/or from the
  • the computing device 10 may include a receiver module 24 that may be configured to receive one or more traffic flows from a corresponding one or more of the components 20a, 20e.
  • traffic flow may refer to a transmission or flow of one or more data packets from, e.g., one of the components 20a, 20e to the computing device 10.
  • the computer device 10 may include a state control module 28 that is configured to control an activity alignment state of the computing device 10.
  • the activity alignment state of the computing device 10 may either be on (e.g., also referred to herein as an activity alignment on state) or off (e.g., also referred to herein as an activity alignment off state), as discussed in more detail herein.
  • Traffic from a component to the computing device 10 may be categorized either as demand traffic or opportunistic traffic.
  • Opportunistic traffic may be a traffic from a component (e.g., component 20a), which the component may opportunistically align with the activity alignment on state of the computing device 10. For example, if the component 20a desires to transmit traffic (e.g., one or more data packets associated with the traffic) to the computing device 10 while the computing device 10 is in the activity alignment off state, the component 20a may wait until the computing device 10 enters the activity alignment on state. Once the computing device 10 enters the activity alignment on state, the component 20a may transmit the traffic to the computing device 10. That is, the component 20a may align the flow of the traffic with the activity alignment on state of the computing device 10. In various embodiments, such traffic may be referred to as opportunistic traffic, and the associated traffic flow may be referred to as opportunistic traffic flow.
  • traffic may be referred to as opportunistic traffic
  • Opportunistic traffic may be a delay tolerant traffic, e.g., the component 20a may delay the flow of the opportunistic traffic to the computing device 10 (e.g., until the computing device 10 enters the activity alignment on state) to a certain extent (e.g., based on a capacity and status of the corresponding buffer).
  • the component 20a may receive and/or generate data packets that the component 20a may desire to transmit to the computing device 10.
  • component 20a may delay the transmission of the data packets to the computing device 10, e.g., by buffering the data packets in the buffer 22a, until the computing device 10 enters the activity alignment on state. Once the computing device 10 enters the activity alignment on state, the component 20a may transmit the buffered data packets from the buffer 22a to the computing device 10 in the form of the opportunistic traffic flow, and subsequently flush the buffer 22a.
  • the computing device 10 may signal or transmit a request to one or more of the components 20a, 20e to transmit opportunistic traffics to the computing device 10.
  • the computing device 10 may signal or transmit a request to one or more of the components 20a, 20e to refrain from transmitting any opportunistic traffic to the computing device 10.
  • demand traffic flow may refer to a transmission or flow of data packets that a component (e.g., component 20b) may desire to send to the computing device 10 without any substantial delay.
  • the component 20b may receive and/or generate data packets that the component 20b may desire to transmit to the computing device 10.
  • the component 20b may not delay the transmission of the data packets to the computing device 10 because, for example, the data packets are of relatively high priority, the buffer 22b is full, and/or for some other appropriate reason.
  • Such data packets may be transmitted by the component 20b to the computing device 10, e.g., irrespective of the activity alignment state of the computing device 10.
  • demand traffic may be delay in-tolerant traffic, as a component may transmit the demand traffic without any substantial delay (e.g., irrespective of the activity alignment state of the computing device 10).
  • traffic from a component to the computing device 10 may be either demand traffic or opportunistic traffic based at least in part on a type of the associated data packets, a type of the component from which the traffic originates, status of the corresponding buffer (e.g., if the buffer has capacity to buffer data packets), and/or the like.
  • opportunistic traffic may be converted to demand traffic if, for example, the corresponding buffer is almost full due to storage of data packets associated with the opportunistic traffic.
  • traffic flows originating from, for example, the component 20e may be demand traffic due to, for example, a lack of buffer in the component 20e to buffer data packets.
  • traffic flows originating from a component may always be demand traffic flows if, for example, the component does not support transmission of opportunistic traffic flows.
  • the computing device 10 may also include a masking module 32 that is configured to selectively mask one or more traffic flows from a corresponding one or more components to the computing device 10.
  • the computing device 10 may also include a hysteresis timer 38 and a mask timer 42.
  • the computing device 10 may also include a traffic processing module 36 configured to process data packets of the traffic flows received by the receiver module 24.
  • the computing device 10 may include or be coupled to one or more other components, e.g., a memory (e.g., for storing information and/or instructions to be executed by one or more components of the computing device 10), one or more antennas (e.g., an omnidirectional antenna), a processor, etc.
  • a memory e.g., for storing information and/or instructions to be executed by one or more components of the computing device 10
  • antennas e.g., an omnidirectional antenna
  • a processor e.g., a processor, etc.
  • Fig. 2 illustrates an example timing diagram associated with an operation of the computing device 10 of Fig. 1 , in accordance with various embodiments of the present disclosure.
  • Fig. 2 illustrates demand and opportunistic traffic flows received by the computing device 10 from one or more of the components 20a, 20e, the activity alignment state of the computing device 10, the state of the hysteresis timer 38 and the mask timer 42, traffic as seen by the state control module 28, and a power consumption of the computing device 10.
  • the computing device 10 may be in the activity alignment off state, during which the computing device 10 may not receive any demand and/or opportunistic traffic.
  • the computing device 10 e.g., the receiver module 24
  • the computing device 10 may enter the activity alignment on state from the activity alignment off state at time t2, as illustrated in Fig. 2.
  • the computing device 10 may activate the mask timer 42.
  • the state control module 28 may cease to detect the demand traffic. Accordingly, the state control module 28 may activate the hysteresis timer 38 from time t2. In various embodiments, the hysteresis timer 38 may remain active until the expiration of a hysteresis time period th or if the state control module 28 detects any traffic, whichever occurs first.
  • the computing device 10 may signal or transmit a request to one or more of the components 20a, 20e to transmit opportunistic traffic to the computing device 10 (e.g., request one or more of the components 20a, 20e to align their opportunistic traffic with the activity alignment on state).
  • one or more opportunistic traffic flows may be received from one or more corresponding components (e.g., components 20a, 20e), as illustrated in Fig. 2.
  • the opportunistic traffic flows are illustrated to be received in bursts, e.g., opportunistic traffic flows O1 , O2, 03 and 04.
  • the opportunistic traffic flows may be received in a continuous manner while the computing device 10 is in the activity alignment on state.
  • one or more of the bursts of the opportunistic traffic flows 01 , 02, 03 and 04 may at least in part overlap.
  • the computing device 10 may request one or more of the components 20a, 20e to transmit opportunistic traffic to the computing device 10.
  • the component 20b may transmit the opportunistic traffic 01 to the computing device 10.
  • a delay represented by a time gap between time t2 and t3 in the component 20b transmitting the
  • opportunistic traffic 01 to the computing device 10 may be due to, for example, latency or delay associated with the component 20b receiving the request from the computing device 10 associated with transmission of the opportunistic traffic, processing the request and/or the actual transmission of the opportunistic traffic 01 .
  • the component 20e may transmit the opportunistic traffic 02 to the computing device 10, wherein a delay (represented by a time gap between time t2 and t4) in the component 20e transmitting the opportunistic traffic 02 to the computing device 10 may be due to, for example, latency or delay associated with the component 20e receiving the request from the computing device 10 associated with transmission of the opportunistic traffic, processing the request and/or the actual transmission of the opportunistic traffic 02.
  • the computing device 10 may still be in the activity alignment on state, and the component 20b may once again send opportunistic traffic 03.
  • the component 20b may flush the buffer 22b (or at least a part of the buffer 22b, as data packets from the buffer 22b may be transmitted to the computing device 10 as the opportunistic traffic 01 ).
  • the buffer 22b (or at least a part of the buffer 22b) may be filled again with new data packets.
  • the component 20b may once again send the opportunistic traffic 03.
  • the mask timer 42 may be on (e.g., may remain active or enabled) for a time period tm (also referred to herein as a mask time period).
  • tm also referred to herein as a mask time period
  • one or more traffic flows e.g., part of the demand traffic after time t2, the opportunistic traffics 01 , 04
  • the receiver module 24 may be masked (e.g., by the mask module 32) from the state control module 28, such that these traffic flows are not detectable by the state control module 28 (e.g., are not detectable for the purposes of changing the activity alignment state of the computing device 10).
  • FIG. 2 also illustrates traffic flow seen by the state control module 28. As illustrated in Fig. 2, due to the masking operation, part of the demand traffic (e.g., which is received after time t2) and the opportunistic traffics 01 , 04 are not seen or detected by the state control module 28.
  • the hysteresis timer 38 may be on (e.g., may remain active or enabled) for the hysteresis time period th, unless the state control module 28 detects any traffic flow from a component to the computing device 10 during the hysteresis time period th.
  • the time periods th and tm may be pre-determined and/or may be user adjustable parameters.
  • the time periods th and tm may be dynamically tuned (e.g., based on traffic activity patterns of the computing device 10).
  • the time period tm may be relatively longer than the time period th.
  • the state control module 28 activates the hysteresis timer 38 after the state control module 28 ceases detecting the demand traffic at time t2 (e.g., due to the masking of the demand traffic at time t2). From time t2 to at least time t6 (i.e., when the hysteresis timer 38 expires), the state control module 28 does not detect any traffic. Accordingly, with the expiration of the hysteresis timer 38 at time t6, the state control module 28 may change the activity alignment state of the computing device 10, at time t7, from the activity alignment on state to the activity alignment off state. That is, at time t7, the computing device 10 may enter the activity alignment off state.
  • the computing device 10 may receive opportunistic traffic 04 at time t8. For example, while in the activity alignment on state, the computing device 10 may transmit a request to the component 20c (along with transmitting the request to various other components) to transmit opportunistic traffic. However, due to, for example, latency or delay involved in receiving the request, processing the request and/or transmitting the data packets from the buffer 22c, the actual opportunistic traffic 04 may be received from the component 20c at time t8 (i.e., after the computing device 10 has entered the activity alignment off state).
  • the mask timer 42 may expire (e.g., be disabled, deactivated, or switched off) at time t9 (i.e., at the end of the mask time period tm). Subsequent to time t9, traffic flow from a component to the computing device 10 may again be detectable or seen by the state control module 28. For example, at time t10, the computing device 10 may again receive demand traffic from one of the components 20a, 20e, based on which the computing device 10 may once again enter the activity alignment on state, and the mask timer 42 and the hysteresis timer 38 may once again be activated, as illustrated in Fig. 2.
  • the mask time period tm may be sufficiently long such that any opportunistic traffic (e.g., 04), received after the computing device 10 enters the activity alignment off state, may cease flowing before the expiration of the mask timer 42. That is, the mask time period tm may be sufficiently long such that no opportunistic traffic flows, resulting from the activity alignment on state between times t2 and t7, are received after the expiration of the mask timer 42 at time t9.
  • any opportunistic traffic e.g., 04
  • the mask time period tm may be sufficiently long such that no opportunistic traffic flows, resulting from the activity alignment on state between times t2 and t7, are received after the expiration of the mask timer 42 at time t9.
  • a power consumption of the computing device 10 may be associated with reception of traffic flows by the computing device 10. For example, prior to time t1 , while no traffic is received by the computing device 10, the computing device 10 may remain in a low power state (e.g., a sleep or an idle mode). However, from time t2 (i.e., from the time the computing device 10 detects and processes the demand traffic), the computing device 10 may remain in a high power state (e.g., a wake state or a full power state) until opportunistic traffics O1 ,
  • the computing device 10 may once again enter the low power state until, e.g., demand traffic is again received at time t10.
  • Opportunistic traffic flow from a component may allow the component to flush existing data packets (which are transmitted as a part of the opportunistic traffic flow) from the associated buffer (e.g., buffer 22b), and subsequently fill the buffer with new data packets.
  • the activity alignment on state is also referred to herein as Opportunistic Buffer Flush & Fill (OBFF) state and the activity alignment off state is also referred to herein as an idle state.
  • OBFF Opportunistic Buffer Flush & Fill
  • PCIe Peripheral Component Interconnect Express
  • the state control module 28 may not be able to distinguish between opportunistic traffic and demand traffic received by the receiver module 24.
  • the state control module 28 would have continued to detect opportunistic traffic flows (e.g., opportunistic traffics 01 , 02, etc.) while the computing device 10 was in the activity alignment on state. Accordingly, without the masking operation, with each occurrence of the opportunistic traffics 01 , 02, etc., the state control module 28 would have reset the hysteresis timer 38. Thus, without the masking operation, the computing device 10 would have remained in the activity alignment on state even after time t7, due to the reception of the opportunistic traffics 01 , 04.
  • opportunistic traffic flows e.g., opportunistic traffics 01 , 02, etc.
  • the computing device 10 may enter the activity alignment off state after the expiration of the time period th from time t2.
  • the hysteresis timer 38 is reset only at time t2, and is not reset at, e.g., times t3, t4 and t5 (i.e., the hysteresis timer 38 is not reset each time opportunistic traffic is received after time t2, due to the masking of opportunistic traffics).
  • the masking operation may ensure that the activity alignment on state lasts only for a pre-determined period of time and may ensure that the computing device 10 enters the activity alignment off state after the expiration of the predetermined period of time, thereby saving power consumption of the computing device 10.
  • the masking operation limits a duration of the activity alignment on state, while providing each of the components 20a, 20e sufficient time to flush their respective buffers at least once.
  • Fig. 3 illustrates an example method 300 for operating the computing device 10 of Fig. 1 , in accordance with various embodiments of the present disclosure.
  • the computing device 10 may receive demand traffic flow at time t1 (e.g., while the computing device 10 is in the activity alignment off state).
  • the computing device 10 may enter the activity alignment on state from the activity alignment off state at time t2.
  • the computing device 10 e.g., the state control module 28
  • the computing device 10 may transmit a request to the components 20a, 20e to transmit opportunistic traffics to the computing device 10.
  • the computing device 10 may receive opportunistic traffic flows (e.g., 01 , 04) from the components 20a, 20e.
  • the masking module 32 may mask, from the state control module 28, one or more traffic flows that are received during at least a part of the activity alignment on state. For example, the masking module 32 may mask the opportunistic traffics 01 , 04 and also the part of the demand traffic that is received after time t2.
  • the state control module 28 may activate the hysteresis timer 38 from time t2.
  • the demand traffic and the opportunistic traffics 01 , 04 may not interrupt the hysteresis timer 38, as these traffics may not be detected by the state control module 28.
  • the computing device 10 may enter the activity alignment off state from the activity alignment on state (e.g., after being in the activity alignment on state for the hysteresis time period th).
  • Fig. 4 schematically illustrates a block diagram of an example computer system 400 that may be suitable for practicing some of the embodiments, including a system for entering an activity alignment on state from an activity alignment off state; masking one or more traffic flows received during at least a part of the activity alignment on state; and entering the activity alignment off state from the activity alignment on state, after being in the activity alignment on state for at least a first time period, based at least in part on said masking the one or more traffic flows.
  • the computer system 400 may include a
  • bus 41 1 for communicating information
  • an integrated circuit component such as a processor 412 coupled with bus 41 1 for processing information.
  • Computer system 400 further comprises a random access memory (RAM) or other dynamic storage device 404 (referred to as main memory) coupled to bus 41 1 for storing information and instructions to be executed by processor 412.
  • main memory 404 (which may be a non-transitory memory) also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 412.
  • Firmware 403 may be a combination of software and hardware, such as Electronically Programmable Read-Only Memory (EPROM) that has the operations for the routine recorded on the EPROM.
  • EPROM Electronically Programmable Read-Only Memory
  • the firmware 403 may embed foundation code, basic input/output system code (BIOS), or other similar code.
  • BIOS basic input/output system code
  • the firmware 403 may make it possible for the computer system 400 to boot itself.
  • Computer system 400 also comprises a read-only memory (ROM) and/or other static storage device 406 coupled to bus 41 1 for storing static information and instructions for processor 412.
  • ROM read-only memory
  • static storage device 406 may store OS level and application level software.
  • Computer system 400 may further be coupled to a display device 421 , such as a cathode ray tube (CRT) or liquid crystal display (LCD), coupled to bus 41 1 for displaying information to a computer user.
  • a display device 421 such as a cathode ray tube (CRT) or liquid crystal display (LCD)
  • a chipset such as chipset 436, may interface with one or more other components of the computer system 400.
  • An alphanumeric input device (keyboard) 422, including alphanumeric and other keys, may also be coupled to bus 41 1 for communicating information and command selections to processor 412.
  • An additional user input device is cursor control device 423, such as a mouse, trackball, trackpad, stylus, or cursor direction keys, coupled to bus 41 1 for communicating direction information and command selections to processor 412, and for controlling cursor movement on a display device 421 .
  • a chipset, such as chip set 436, may interface with the input output devices.
  • bus 41 1 Another device that may be coupled to bus 41 1 is a hard copy device 424, which may be used for printing instructions, data, or other information on a medium such as paper, film, or similar types of media. Furthermore, a sound recording and playback device, such as a speaker and/or microphone (not shown) may optionally be coupled to bus 41 1 for audio interfacing with computer system 400.
  • a wired/wireless communication capability 425 Another device that may be coupled to bus 41 1 is a wired/wireless communication capability 425, which, in one embodiment, may be one or more antennas (e.g., an omnidirectional antenna).
  • Computer system 400 has a power supply 428 such as a battery, an AC power plug connection and rectifier, a DC power connection, and/or the like, as one of ordinary skill in the relevant art would appreciate based at least on the teachings provided herein.
  • a power supply 428 such as a battery, an AC power plug connection and rectifier, a DC power connection, and/or the like, as one of ordinary skill in the relevant art would appreciate based at least on the teachings provided herein.
  • one or more components may be communicatively coupled to the computer system 400.
  • the computer system 400 may also include, for example, a receiver module, a state control module, a traffic processing module, a hysteresis timer, a masking module and/or a mask timer, similar to those illustrated in Fig. 1 .
  • the receiver module may be coupled to the bus 41 1 and may receive traffic flows from the components 20a, 20e.
  • the state control module 28 may control the activity alignment state of the computer system 400.
  • the processor 412 and the state control module may be co-disposed on an integrated circuit.
  • the processor 412 may be configured to operate as the state control module.
  • the computer system 400 may have dimension or shape configured to facilitate the computer system 400 to be employed for mobile computing.
  • the computer system 400 may be used as a mobile phone, a laptop, a personal digital assistant, a palmtop, a MP3 player, a personal computer, a set-top box, or any other appropriate type of computing device.
  • the computer system 400 may be used as a mobile computing device.
  • the processor 412 and various components of the computer system 400 may be housed in a body having dimension or shape configured to facilitate the computer system to be employed for mobile computing.
  • articles of manufacture may be provided that include non-transitory storage mediums having instructions stored thereon that, if executed, result in the operations described herein with respect to Fig. 3.
  • storage mediums may be stored in the computing device 10 of Fig. 1 .
  • each of the storage mediums comprises some type of memory (not shown).
  • the articles of manufacture may be computer-readable mediums such as, for example, software or firmware.
  • methods comprise entering, by a computing device, an activity alignment on state from a first activity alignment off state;
  • said masking comprises masking the one or more traffic flows from the state control module such that the one or more traffic flows are not detectable by a state control module.
  • said masking comprises masking the one or more traffic flows such that the one or more other traffic flows are masked during at least a second time period, wherein the second time period commences in response to the computing device entering the activity alignment on state, and wherein the second time period is longer than the first time period.
  • any one or more of the foregoing methods further comprise in response to entering the activity alignment on state, activating, by the computing device, a mask timer; and ending said masking the one or more traffic flows in response to the mask timer reaching the second time period.
  • any one or more of the foregoing methods further comprise in response to entering the activity alignment on state, requesting, by the computing device, a plurality of components to transmit opportunistic traffics to the computing device.
  • said entering the activity alignment on state comprises receiving a demand traffic flow while the computing device is in the first activity alignment off state; and in response to receiving the demand traffic flow, entering the activity alignment on state.
  • any one or more of the foregoing methods further comprise in response to entering the activity alignment on state and masking the one or more traffic flows, activating a hysteresis timer, wherein said entering the second activity alignment off state comprises entering the second activity alignment off state in response to the hysteresis timer completing the first time period.
  • the hysteresis timer remains active during the first time period, in spite of the computing device receiving the one or more traffic flows during the first time period, based at least in part on said masking the one or more traffic flows.
  • other methods comprise entering receiving, by a computing device, a first traffic flow while the computing device is in an idle state; in response to receiving the first traffic flow, entering an Opportunistic Buffer Flush & Fill (OBFF) state; in response to entering the OBFF state, receiving one or more other traffic flows; and masking the one or more other traffic flows.
  • OBFF Opportunistic Buffer Flush & Fill
  • said masking further comprises masking the one or more other traffic flows, such that (i) the one or more other traffic flows are masked during at least a first time period that commences in response to the computing device entering the OBFF state and (ii) the one or more other traffic flows are not detectable for a purpose of changing a state of the computing device.
  • any one or more of the foregoing methods further comprises masking a part of the first traffic flow that is received after the computing device enters the OBFF state.
  • any one or more of the foregoing methods further comprises entering, by the computing device, the idle state from the OBFF state, after being in the OBFF state for at least a first time period, based at least in part on said masking the one or more other traffic flows.
  • a computing device comprises a receiver module configured to receive a first traffic flow from a first component while the computing device is in a first activity alignment off state; a state controller module configured to change an activity alignment state of the computing device to an activity alignment on state from the first activity alignment off state, based at least in part on the receiver module receiving the first traffic flow, wherein the state controller module is configured to request a plurality of components to transmit opportunistic traffics to the computing device while the computing device is in the activity alignment on state; and a masking module configured to mask a plurality of traffic flows, including the first traffic flow and one or more opportunistic traffic flows, from the state controller module in response to the computing device entering the activity alignment on state.
  • the computing device further comprises a hysteresis timer, wherein the state controller module is configured to activate the hysteresis timer in response to the masking module masking the plurality of traffic flows from the state controller module; wherein the state controller module is configured to change the activity alignment state of the computing device to a second activity alignment off state from the activity alignment on state, based at least in part on the hysteresis timer being active for at least a first time period.
  • the masking device is configured to mask the plurality of traffic flows for at least a second time period that commences with the computing device entering the activity alignment on state, wherein the second time period is longer than the first time period.
  • the masking module is configured to mask the plurality of traffic flows such that the plurality of traffic flows are not detectable by the state control module.
  • the receiver module is configured to receive, in response to the request to transmit opportunistic traffics to the computing device, one or more opportunistic traffic flows from a corresponding one or more components of the plurality of components.
  • the receiver module is configured to receive at least one of the one or more opportunistic traffic flows after the change of the activity alignment state of the computing device to the second activity alignment off state.
  • the computing device further comprises a traffic processing module configured to process data packets associated with the plurality of traffic flows.
  • the first component is one of a universal serial bus (USB) device, a peripheral component interconnect (PCI) device and a PCI Express (PCIe) device.
  • USB universal serial bus
  • PCI peripheral component interconnect
  • PCIe PCI Express
  • a system comprises a memory; an antenna; a receiver module configured to receive a first traffic flow from a first component while the system is in a first activity alignment off state; a state controller module configured to change an activity alignment state of the system to an activity alignment on state from the first activity alignment off state, based at least in part on the receiver module receiving the first traffic flow, wherein the state controller module is configured to request a plurality of components to transmit opportunistic traffics to the system while the system is in the activity alignment on state; and a masking module configured to mask a plurality of traffic flows, including the first traffic flow and one or more opportunistic traffic flows, from the state controller module in response to the system entering the activity alignment on state.
  • the system further comprises a hysteresis timer, wherein the state controller module is configured to activate the hysteresis timer in response to the masking module masking the plurality of traffic flows from the state controller module; wherein the state controller module is configured to change the activity alignment state of the computing device to a second activity alignment off state from the activity alignment on state, based at least in part on the hysteresis timer being active for at least a first time period.

Abstract

Embodiments of methods and apparatus for entering an activity alignment on state from an activity alignment off state; masking one or more traffic flows that are received during at least a part of the activity alignment on state; and entering the activity alignment off state from the activity alignment on state, after being in the activity alignment on state for at least a first time period, based at least in part on said masking the one or more traffic flows. Additional variants and embodiments are also disclosed.

Description

ACTIVITY ALIGNMENT ALGORITHM BY MASKING TRAFFIC FLOWS
TECHNICAL FIELD
Embodiments of the present disclosure relate generally to activity alignment algorithms, and more particularly, to methods and apparatuses for activity alignment algorithms in which traffic flows are selectively masked.
BACKGROUND
In today's technological world, performances of electronics devices are improving at a rapid pace, with a rapid increase in their computing power. With this increase, the devices are becoming power hungry, i.e., consuming more power. To save power, a processor in a device may sometimes enter a low power mode during brief periods of inactivity. Power management for computing systems are desired for many reasons, including prolonging battery life in a mobile computing device, reducing heat dissipation and cooling requirement, and reducing operating costs from energy and cooling.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the present disclosure will be described by way of example embodiments, but not limitations, illustrated in the accompanying drawings in which like references denote similar elements, and in which:
Fig. 1 schematically illustrates a computing device, in accordance with various embodiments of the present disclosure.
Fig. 2 illustrates an example timing diagram associated with an operation of the computing device of Fig. 1 , in accordance with various embodiments of the present disclosure.
Fig. 3 illustrates an example method for operating the computing device of Fig. 1 , in accordance with various embodiments of the present disclosure.
Fig. 4 schematically illustrates a block diagram of an example computer system that may be suitable for practicing some of the embodiments.
DETAILED DESCRIPTION
Illustrative embodiments of the present disclosure include, but are not limited to, methods and apparatuses for activity alignment algorithms by masking traffic flows.
Various aspects of the illustrative embodiments will be described using terms commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art. However, it will be apparent to those skilled in the art that alternate embodiments may be practiced with only some of the described aspects. For purposes of explanation, specific numbers, materials, and configurations are set forth in order to provide a thorough understanding of the illustrative embodiments. However, it will be apparent to one skilled in the art that alternate embodiments may be practiced without the specific details. In other instances, well-known features are omitted or simplified in order not to obscure the illustrative embodiments.
Further, various operations will be described as multiple discrete
operations, in turn, in a manner that is most helpful in understanding the illustrative embodiments; however, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations need not be performed in the order of presentation.
The phrase "in some embodiments" is used repeatedly. The phrase generally does not refer to the same embodiments; however, it may. The terms "comprising," "having," and "including" are synonymous, unless the context dictates otherwise. The phrase "A and/or B" means (A), (B), or (A and B). The phrase "A/B" means (A), (B), or (A and B), similar to the phrase "A and/or B". The phrase "at least one of A, B and C" means (A), (B), (C), (A and B), (A and C), (B and C) or (A, B and C). The phrase "(A) B" means (B) or (A and B), that is, A is optional.
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent implementations may be substituted for the specific embodiments shown and described, without departing from the scope of the embodiments of the present disclosure. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that the embodiments of the present disclosure be limited only by the claims and the equivalents thereof.
As used herein, the term "module" may refer to, be part of, or include an
Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and/or memory (shared, dedicated, or group) that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality. Fig. 1 schematically illustrates a computing device 10, in accordance with various embodiments of the present disclosure. In various embodiments, the computing device 10 may be, for example, a laptop, a cell phone, a personal computer, a mobile computing device, a personal digital assistant, a palmtop, a set-top box, an appropriate consumer electronic device, or any other appropriate type of computing device.
The computing device 10 may be communicatively coupled to a plurality of components 20a, 20e. In various embodiments, the plurality of components 20a, 20e may include one or more hardware/software components associated with the computing device 10. Although Fig. 1 illustrates each of the plurality of components 20a, 20e to be external to the computing device 10, in various embodiments, one or more of the plurality of components 20a, 20e may be internal to the computing device 10. The components 20a, 20e may include, for example, external devices coupled to the computing device 10, and/or devices/hardware internal to the computing device 10, including but not limited to a universal serial bus (USB) device (including devices compatible with various versions of the USB standard, e.g., USB 2.0, 3.0, etc.), a peripheral component interconnect (PCI) device, a PCI Express (PCIe) device, a network interface card, a peripheral device, a printer, a scanner, a disk drive, a camera, a network adapter, a serial advanced technology attachment (SATA), a parallel advanced technology attachment (PATA), an inter-integrated circuit (I2C), a secure digital (SD) device, a serial peripheral interface (SPI) bus, a system management bus (SMBus), etc.
Although not illustrated, the components 20a, 20e may include one or more controllers configured to control one or more devices/functions in the computing device 10, including but not limited to, a USB host controller, a memory controller, an Ethernet controller, a graphics controller, a hard disk controller (HDD), an audio controller, an advanced host controller interface (AHCI), etc. In various embodiments, the components 20a, 20e may include one or more software applications running on the computing device 10, one or more device drivers, an operating system, etc.
One or more of the components 20a, 20e may include (or be otherwise associated with) a corresponding buffer. For example, the component 20a may include a buffer 22a, the component 20b may include a buffer 22b, and so on, as illustrated in Fig. 1 . In various embodiments, one or more of the components 20a,
20e, e.g., the component 20e may not include (or be otherwise associated with) a corresponding buffer, as illustrated in Fig. 1 . In Fig. 1 , a buffer associated with a component (e.g., buffer 22a of the component 20a) is illustrated to be included in the component. However, in various other embodiments, a buffer associated with a component (e.g., the buffer 22a of the component 20a) may be external to the component (e.g., included in the computing device 10 (e.g., in the receiver module 24) or located in any other appropriate place), and may be configured to buffer data packets that are transmitted to and/or from the
component.
The computing device 10 may include a receiver module 24 that may be configured to receive one or more traffic flows from a corresponding one or more of the components 20a, 20e. In various embodiments, traffic flow may refer to a transmission or flow of one or more data packets from, e.g., one of the components 20a, 20e to the computing device 10.
The computer device 10 may include a state control module 28 that is configured to control an activity alignment state of the computing device 10. For example, the activity alignment state of the computing device 10 may either be on (e.g., also referred to herein as an activity alignment on state) or off (e.g., also referred to herein as an activity alignment off state), as discussed in more detail herein.
Traffic from a component to the computing device 10 may be categorized either as demand traffic or opportunistic traffic. Opportunistic traffic may be a traffic from a component (e.g., component 20a), which the component may opportunistically align with the activity alignment on state of the computing device 10. For example, if the component 20a desires to transmit traffic (e.g., one or more data packets associated with the traffic) to the computing device 10 while the computing device 10 is in the activity alignment off state, the component 20a may wait until the computing device 10 enters the activity alignment on state. Once the computing device 10 enters the activity alignment on state, the component 20a may transmit the traffic to the computing device 10. That is, the component 20a may align the flow of the traffic with the activity alignment on state of the computing device 10. In various embodiments, such traffic may be referred to as opportunistic traffic, and the associated traffic flow may be referred to as opportunistic traffic flow.
Opportunistic traffic may be a delay tolerant traffic, e.g., the component 20a may delay the flow of the opportunistic traffic to the computing device 10 (e.g., until the computing device 10 enters the activity alignment on state) to a certain extent (e.g., based on a capacity and status of the corresponding buffer). In an example, the component 20a may receive and/or generate data packets that the component 20a may desire to transmit to the computing device 10. The
component 20a may delay the transmission of the data packets to the computing device 10, e.g., by buffering the data packets in the buffer 22a, until the computing device 10 enters the activity alignment on state. Once the computing device 10 enters the activity alignment on state, the component 20a may transmit the buffered data packets from the buffer 22a to the computing device 10 in the form of the opportunistic traffic flow, and subsequently flush the buffer 22a.
While the computing device 10 is in the activity alignment on state, the computing device 10 (e.g., the state control module 28) may signal or transmit a request to one or more of the components 20a, 20e to transmit opportunistic traffics to the computing device 10. On the other hand, while the computing device 10 is in the activity alignment off state, the computing device 10 (e.g., the state control module 28) may signal or transmit a request to one or more of the components 20a, 20e to refrain from transmitting any opportunistic traffic to the computing device 10.
In various embodiments, demand traffic flow may refer to a transmission or flow of data packets that a component (e.g., component 20b) may desire to send to the computing device 10 without any substantial delay. In an example, the component 20b may receive and/or generate data packets that the component 20b may desire to transmit to the computing device 10. The component 20b may not delay the transmission of the data packets to the computing device 10 because, for example, the data packets are of relatively high priority, the buffer 22b is full, and/or for some other appropriate reason. Such data packets may be transmitted by the component 20b to the computing device 10, e.g., irrespective of the activity alignment state of the computing device 10. In various embodiments, demand traffic may be delay in-tolerant traffic, as a component may transmit the demand traffic without any substantial delay (e.g., irrespective of the activity alignment state of the computing device 10).
As discussed, in various embodiments, traffic from a component to the computing device 10 may be either demand traffic or opportunistic traffic based at least in part on a type of the associated data packets, a type of the component from which the traffic originates, status of the corresponding buffer (e.g., if the buffer has capacity to buffer data packets), and/or the like. In an example, opportunistic traffic may be converted to demand traffic if, for example, the corresponding buffer is almost full due to storage of data packets associated with the opportunistic traffic. In various embodiments, traffic flows originating from, for example, the component 20e may be demand traffic due to, for example, a lack of buffer in the component 20e to buffer data packets. In various embodiments, traffic flows originating from a component may always be demand traffic flows if, for example, the component does not support transmission of opportunistic traffic flows.
In various embodiments, the computing device 10 may also include a masking module 32 that is configured to selectively mask one or more traffic flows from a corresponding one or more components to the computing device 10. In various embodiments, the computing device 10 may also include a hysteresis timer 38 and a mask timer 42. In various embodiments, the computing device 10 may also include a traffic processing module 36 configured to process data packets of the traffic flows received by the receiver module 24.
Although not illustrated in Fig. 1 , the computing device 10 may include or be coupled to one or more other components, e.g., a memory (e.g., for storing information and/or instructions to be executed by one or more components of the computing device 10), one or more antennas (e.g., an omnidirectional antenna), a processor, etc.
Fig. 2 illustrates an example timing diagram associated with an operation of the computing device 10 of Fig. 1 , in accordance with various embodiments of the present disclosure. Fig. 2 illustrates demand and opportunistic traffic flows received by the computing device 10 from one or more of the components 20a, 20e, the activity alignment state of the computing device 10, the state of the hysteresis timer 38 and the mask timer 42, traffic as seen by the state control module 28, and a power consumption of the computing device 10. Referring to Figs. 1 and 2, prior to time t1 , the computing device 10 may be in the activity alignment off state, during which the computing device 10 may not receive any demand and/or opportunistic traffic. At time t1 , the computing device 10 (e.g., the receiver module 24) may receive demand traffic flow from, for example, the component 20a.
In response to receiving the demand traffic flow at time t1 , the computing device 10 (e.g., the state control module 28) may enter the activity alignment on state from the activity alignment off state at time t2, as illustrated in Fig. 2.
Furthermore, in response to entering the activity alignment on state at time t2, the computing device 10 may activate the mask timer 42.
Moreover, as discussed in more detail herein and as also illustrated in Fig. 2, from time t2, the state control module 28 may cease to detect the demand traffic. Accordingly, the state control module 28 may activate the hysteresis timer 38 from time t2. In various embodiments, the hysteresis timer 38 may remain active until the expiration of a hysteresis time period th or if the state control module 28 detects any traffic, whichever occurs first.
Also, in response to entering the activity alignment on state at time t2, the computing device 10 (e.g., the state control module 28) may signal or transmit a request to one or more of the components 20a, 20e to transmit opportunistic traffic to the computing device 10 (e.g., request one or more of the components 20a, 20e to align their opportunistic traffic with the activity alignment on state).
In response to entering the activity alignment on state, one or more opportunistic traffic flows may be received from one or more corresponding components (e.g., components 20a, 20e), as illustrated in Fig. 2. In Fig. 2, the opportunistic traffic flows are illustrated to be received in bursts, e.g., opportunistic traffic flows O1 , O2, 03 and 04. However, in various other embodiments, the opportunistic traffic flows may be received in a continuous manner while the computing device 10 is in the activity alignment on state. Although not illustrated in Fig. 2, in various embodiments, one or more of the bursts of the opportunistic traffic flows 01 , 02, 03 and 04 may at least in part overlap.
As an example, when the computing device 10 enters the activity alignment on state at time t2, the computing device 10 may request one or more of the components 20a, 20e to transmit opportunistic traffic to the computing device 10. In various embodiments, at time t3, the component 20b may transmit the opportunistic traffic 01 to the computing device 10. A delay (represented by a time gap between time t2 and t3) in the component 20b transmitting the
opportunistic traffic 01 to the computing device 10 may be due to, for example, latency or delay associated with the component 20b receiving the request from the computing device 10 associated with transmission of the opportunistic traffic, processing the request and/or the actual transmission of the opportunistic traffic 01 . As another example, at time t4, the component 20e may transmit the opportunistic traffic 02 to the computing device 10, wherein a delay (represented by a time gap between time t2 and t4) in the component 20e transmitting the opportunistic traffic 02 to the computing device 10 may be due to, for example, latency or delay associated with the component 20e receiving the request from the computing device 10 associated with transmission of the opportunistic traffic, processing the request and/or the actual transmission of the opportunistic traffic 02.
As yet another example, at time t5, the computing device 10 may still be in the activity alignment on state, and the component 20b may once again send opportunistic traffic 03. For example, after sending the opportunistic traffic 01 , the component 20b may flush the buffer 22b (or at least a part of the buffer 22b, as data packets from the buffer 22b may be transmitted to the computing device 10 as the opportunistic traffic 01 ). After transmitting the opportunistic traffic 01 , the buffer 22b (or at least a part of the buffer 22b) may be filled again with new data packets. As the computing device 10 is still in the activity alignment on state, at time t5, the component 20b may once again send the opportunistic traffic 03.
Referring again to Figs. 1 and 2, once activated or enabled, the mask timer 42 may be on (e.g., may remain active or enabled) for a time period tm (also referred to herein as a mask time period). In various embodiments, while the mask timer 42 is enabled, one or more traffic flows (e.g., part of the demand traffic after time t2, the opportunistic traffics 01 , 04) received by the receiver module 24 may be masked (e.g., by the mask module 32) from the state control module 28, such that these traffic flows are not detectable by the state control module 28 (e.g., are not detectable for the purposes of changing the activity alignment state of the computing device 10). Fig. 2 also illustrates traffic flow seen by the state control module 28. As illustrated in Fig. 2, due to the masking operation, part of the demand traffic (e.g., which is received after time t2) and the opportunistic traffics 01 , 04 are not seen or detected by the state control module 28.
Referring again to Figs. 1 and 2, once activated or enabled, the hysteresis timer 38 may be on (e.g., may remain active or enabled) for the hysteresis time period th, unless the state control module 28 detects any traffic flow from a component to the computing device 10 during the hysteresis time period th. In various embodiments, the time periods th and tm may be pre-determined and/or may be user adjustable parameters. In various embodiments, the time periods th and tm may be dynamically tuned (e.g., based on traffic activity patterns of the computing device 10). In various embodiments, the time period tm may be relatively longer than the time period th.
As previously discussed, the state control module 28 activates the hysteresis timer 38 after the state control module 28 ceases detecting the demand traffic at time t2 (e.g., due to the masking of the demand traffic at time t2). From time t2 to at least time t6 (i.e., when the hysteresis timer 38 expires), the state control module 28 does not detect any traffic. Accordingly, with the expiration of the hysteresis timer 38 at time t6, the state control module 28 may change the activity alignment state of the computing device 10, at time t7, from the activity alignment on state to the activity alignment off state. That is, at time t7, the computing device 10 may enter the activity alignment off state.
In various embodiments, even after entering the activity alignment off state, the computing device 10 may receive opportunistic traffic 04 at time t8. For example, while in the activity alignment on state, the computing device 10 may transmit a request to the component 20c (along with transmitting the request to various other components) to transmit opportunistic traffic. However, due to, for example, latency or delay involved in receiving the request, processing the request and/or transmitting the data packets from the buffer 22c, the actual opportunistic traffic 04 may be received from the component 20c at time t8 (i.e., after the computing device 10 has entered the activity alignment off state).
The mask timer 42 may expire (e.g., be disabled, deactivated, or switched off) at time t9 (i.e., at the end of the mask time period tm). Subsequent to time t9, traffic flow from a component to the computing device 10 may again be detectable or seen by the state control module 28. For example, at time t10, the computing device 10 may again receive demand traffic from one of the components 20a, 20e, based on which the computing device 10 may once again enter the activity alignment on state, and the mask timer 42 and the hysteresis timer 38 may once again be activated, as illustrated in Fig. 2.
In various embodiments, the mask time period tm may be sufficiently long such that any opportunistic traffic (e.g., 04), received after the computing device 10 enters the activity alignment off state, may cease flowing before the expiration of the mask timer 42. That is, the mask time period tm may be sufficiently long such that no opportunistic traffic flows, resulting from the activity alignment on state between times t2 and t7, are received after the expiration of the mask timer 42 at time t9.
In various embodiments, a power consumption of the computing device 10 may be associated with reception of traffic flows by the computing device 10. For example, prior to time t1 , while no traffic is received by the computing device 10, the computing device 10 may remain in a low power state (e.g., a sleep or an idle mode). However, from time t2 (i.e., from the time the computing device 10 detects and processes the demand traffic), the computing device 10 may remain in a high power state (e.g., a wake state or a full power state) until opportunistic traffics O1 ,
04 are received and processed by the computing device 10. In various embodiments, after the computing device 10 receives and processes the last burst of opportunistic traffic 04, the computing device 10 may once again enter the low power state until, e.g., demand traffic is again received at time t10.
Opportunistic traffic flow from a component (e.g., component 20b) may allow the component to flush existing data packets (which are transmitted as a part of the opportunistic traffic flow) from the associated buffer (e.g., buffer 22b), and subsequently fill the buffer with new data packets. In various embodiments, the activity alignment on state is also referred to herein as Opportunistic Buffer Flush & Fill (OBFF) state and the activity alignment off state is also referred to herein as an idle state. Various embodiments of the present disclosure may be used at least in part in accordance with the OBFF state, as presented in, e.g., the Peripheral Component Interconnect Express (PCIe) Base specifications, e.g., PCIe Base 2.0 specification, approved 15 January 2007, along with any
amendments, updates, and/or revisions.
In various embodiments, there may be several advantages of masking traffic flows from the state control module 28. For example, in various embodiments, the state control module 28 may not be able to distinguish between opportunistic traffic and demand traffic received by the receiver module 24.
Accordingly, without the above discussed masking operation, the state control module 28 would have continued to detect opportunistic traffic flows (e.g., opportunistic traffics 01 , 02, etc.) while the computing device 10 was in the activity alignment on state. Accordingly, without the masking operation, with each occurrence of the opportunistic traffics 01 , 02, etc., the state control module 28 would have reset the hysteresis timer 38. Thus, without the masking operation, the computing device 10 would have remained in the activity alignment on state even after time t7, due to the reception of the opportunistic traffics 01 , 04. However, due to the above discussed masking operation, the computing device 10 may enter the activity alignment off state after the expiration of the time period th from time t2. The hysteresis timer 38 is reset only at time t2, and is not reset at, e.g., times t3, t4 and t5 (i.e., the hysteresis timer 38 is not reset each time opportunistic traffic is received after time t2, due to the masking of opportunistic traffics). The masking operation may ensure that the activity alignment on state lasts only for a pre-determined period of time and may ensure that the computing device 10 enters the activity alignment off state after the expiration of the predetermined period of time, thereby saving power consumption of the computing device 10. Thus, the masking operation limits a duration of the activity alignment on state, while providing each of the components 20a, 20e sufficient time to flush their respective buffers at least once.
Fig. 3 illustrates an example method 300 for operating the computing device 10 of Fig. 1 , in accordance with various embodiments of the present disclosure. Referring to Figs. 1 -3, at 304, the computing device 10 may receive demand traffic flow at time t1 (e.g., while the computing device 10 is in the activity alignment off state). At 308, in response to receiving the demand traffic flow, the computing device 10 may enter the activity alignment on state from the activity alignment off state at time t2. As previously discussed, upon entering the activity alignment on state, the computing device 10 (e.g., the state control module 28) may transmit a request to the components 20a, 20e to transmit opportunistic traffics to the computing device 10. In response to transmitting the request, the computing device 10 may receive opportunistic traffic flows (e.g., 01 , 04) from the components 20a, 20e. At 312, the masking module 32 may mask, from the state control module 28, one or more traffic flows that are received during at least a part of the activity alignment on state. For example, the masking module 32 may mask the opportunistic traffics 01 , 04 and also the part of the demand traffic that is received after time t2. Furthermore, as the state control module 28 may not detect any traffic flow from time t2, the state control module 28 may activate the hysteresis timer 38 from time t2. The demand traffic and the opportunistic traffics 01 , 04 may not interrupt the hysteresis timer 38, as these traffics may not be detected by the state control module 28.
Accordingly, at 316, at the end of the hysteresis time period th at time t7, the computing device 10 may enter the activity alignment off state from the activity alignment on state (e.g., after being in the activity alignment on state for the hysteresis time period th).
Fig. 4 schematically illustrates a block diagram of an example computer system 400 that may be suitable for practicing some of the embodiments, including a system for entering an activity alignment on state from an activity alignment off state; masking one or more traffic flows received during at least a part of the activity alignment on state; and entering the activity alignment off state from the activity alignment on state, after being in the activity alignment on state for at least a first time period, based at least in part on said masking the one or more traffic flows.
In some embodiments, the computer system 400 may include a
communication mechanism or bus 41 1 for communicating information, and an integrated circuit component such as a processor 412 coupled with bus 41 1 for processing information.
Computer system 400 further comprises a random access memory (RAM) or other dynamic storage device 404 (referred to as main memory) coupled to bus 41 1 for storing information and instructions to be executed by processor 412. Main memory 404 (which may be a non-transitory memory) also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 412.
Firmware 403 may be a combination of software and hardware, such as Electronically Programmable Read-Only Memory (EPROM) that has the operations for the routine recorded on the EPROM. The firmware 403 may embed foundation code, basic input/output system code (BIOS), or other similar code. The firmware 403 may make it possible for the computer system 400 to boot itself.
Computer system 400 also comprises a read-only memory (ROM) and/or other static storage device 406 coupled to bus 41 1 for storing static information and instructions for processor 412. The static storage device 406 may store OS level and application level software.
Computer system 400 may further be coupled to a display device 421 , such as a cathode ray tube (CRT) or liquid crystal display (LCD), coupled to bus 41 1 for displaying information to a computer user. A chipset, such as chipset 436, may interface with one or more other components of the computer system 400.
An alphanumeric input device (keyboard) 422, including alphanumeric and other keys, may also be coupled to bus 41 1 for communicating information and command selections to processor 412. An additional user input device is cursor control device 423, such as a mouse, trackball, trackpad, stylus, or cursor direction keys, coupled to bus 41 1 for communicating direction information and command selections to processor 412, and for controlling cursor movement on a display device 421 . A chipset, such as chip set 436, may interface with the input output devices.
Another device that may be coupled to bus 41 1 is a hard copy device 424, which may be used for printing instructions, data, or other information on a medium such as paper, film, or similar types of media. Furthermore, a sound recording and playback device, such as a speaker and/or microphone (not shown) may optionally be coupled to bus 41 1 for audio interfacing with computer system 400. Another device that may be coupled to bus 41 1 is a wired/wireless communication capability 425, which, in one embodiment, may be one or more antennas (e.g., an omnidirectional antenna).
Computer system 400 has a power supply 428 such as a battery, an AC power plug connection and rectifier, a DC power connection, and/or the like, as one of ordinary skill in the relevant art would appreciate based at least on the teachings provided herein.
In various embodiments, one or more components, e.g., components 20a, 20e of Fig. 1 (not shown in Fig. 4) may be communicatively coupled to the computer system 400. The computer system 400 may also include, for example, a receiver module, a state control module, a traffic processing module, a hysteresis timer, a masking module and/or a mask timer, similar to those illustrated in Fig. 1 .
In various embodiments, the receiver module may be coupled to the bus 41 1 and may receive traffic flows from the components 20a, 20e. In various embodiments, the state control module 28 may control the activity alignment state of the computer system 400. In various embodiments, the processor 412 and the state control module may be co-disposed on an integrated circuit. In various embodiments, the processor 412 may be configured to operate as the state control module.
In various embodiments, the computer system 400, including the processor 412 and/or various hardware components, may have dimension or shape configured to facilitate the computer system 400 to be employed for mobile computing. In various embodiments, the computer system 400 may be used as a mobile phone, a laptop, a personal digital assistant, a palmtop, a MP3 player, a personal computer, a set-top box, or any other appropriate type of computing device. In various embodiments, the computer system 400 may be used as a mobile computing device. In various embodiments, the processor 412 and various components of the computer system 400 may be housed in a body having dimension or shape configured to facilitate the computer system to be employed for mobile computing.
In accordance with various embodiments, articles of manufacture may be provided that include non-transitory storage mediums having instructions stored thereon that, if executed, result in the operations described herein with respect to Fig. 3. For example, such storage mediums may be stored in the computing device 10 of Fig. 1 . In an embodiment, each of the storage mediums comprises some type of memory (not shown). In accordance with various embodiments, the articles of manufacture may be computer-readable mediums such as, for example, software or firmware.
The following examples pertain to further embodiments.
In various embodiments, methods comprise entering, by a computing device, an activity alignment on state from a first activity alignment off state;
masking, by the computing device, one or more traffic flows that are received during at least a part of the activity alignment on state; and entering, by the computing device, a second activity alignment off state from the activity alignment on state, after being in the activity alignment on state for at least a first time period, based at least in part on said masking the one or more traffic flows.
In various embodiments, said masking comprises masking the one or more traffic flows from the state control module such that the one or more traffic flows are not detectable by a state control module.
In various embodiments, said masking comprises masking the one or more traffic flows such that the one or more other traffic flows are masked during at least a second time period, wherein the second time period commences in response to the computing device entering the activity alignment on state, and wherein the second time period is longer than the first time period.
In various embodiments, any one or more of the foregoing methods further comprise in response to entering the activity alignment on state, activating, by the computing device, a mask timer; and ending said masking the one or more traffic flows in response to the mask timer reaching the second time period.
In various embodiments, any one or more of the foregoing methods further comprise in response to entering the activity alignment on state, requesting, by the computing device, a plurality of components to transmit opportunistic traffics to the computing device.
In various embodiments, said entering the activity alignment on state comprises receiving a demand traffic flow while the computing device is in the first activity alignment off state; and in response to receiving the demand traffic flow, entering the activity alignment on state.
In various embodiments, any one or more of the foregoing methods further comprise in response to entering the activity alignment on state and masking the one or more traffic flows, activating a hysteresis timer, wherein said entering the second activity alignment off state comprises entering the second activity alignment off state in response to the hysteresis timer completing the first time period.
In various embodiments, the hysteresis timer remains active during the first time period, in spite of the computing device receiving the one or more traffic flows during the first time period, based at least in part on said masking the one or more traffic flows. In various embodiments, other methods comprise entering receiving, by a computing device, a first traffic flow while the computing device is in an idle state; in response to receiving the first traffic flow, entering an Opportunistic Buffer Flush & Fill (OBFF) state; in response to entering the OBFF state, receiving one or more other traffic flows; and masking the one or more other traffic flows.
In various embodiments, said masking further comprises masking the one or more other traffic flows, such that (i) the one or more other traffic flows are masked during at least a first time period that commences in response to the computing device entering the OBFF state and (ii) the one or more other traffic flows are not detectable for a purpose of changing a state of the computing device.
In various embodiments, any one or more of the foregoing methods further comprises masking a part of the first traffic flow that is received after the computing device enters the OBFF state.
In various embodiments, any one or more of the foregoing methods further comprises entering, by the computing device, the idle state from the OBFF state, after being in the OBFF state for at least a first time period, based at least in part on said masking the one or more other traffic flows.
All optional features of the methods described above may also be implemented with respect to apparatuses described herein. For instance, in various embodiments, a computing device comprises a receiver module configured to receive a first traffic flow from a first component while the computing device is in a first activity alignment off state; a state controller module configured to change an activity alignment state of the computing device to an activity alignment on state from the first activity alignment off state, based at least in part on the receiver module receiving the first traffic flow, wherein the state controller module is configured to request a plurality of components to transmit opportunistic traffics to the computing device while the computing device is in the activity alignment on state; and a masking module configured to mask a plurality of traffic flows, including the first traffic flow and one or more opportunistic traffic flows, from the state controller module in response to the computing device entering the activity alignment on state.
In various embodiments, the computing device further comprises a hysteresis timer, wherein the state controller module is configured to activate the hysteresis timer in response to the masking module masking the plurality of traffic flows from the state controller module; wherein the state controller module is configured to change the activity alignment state of the computing device to a second activity alignment off state from the activity alignment on state, based at least in part on the hysteresis timer being active for at least a first time period.
In various embodiments, the masking device is configured to mask the plurality of traffic flows for at least a second time period that commences with the computing device entering the activity alignment on state, wherein the second time period is longer than the first time period.
In various embodiments, the masking module is configured to mask the plurality of traffic flows such that the plurality of traffic flows are not detectable by the state control module.
In various embodiments, the receiver module is configured to receive, in response to the request to transmit opportunistic traffics to the computing device, one or more opportunistic traffic flows from a corresponding one or more components of the plurality of components.
In various embodiments, the receiver module is configured to receive at least one of the one or more opportunistic traffic flows after the change of the activity alignment state of the computing device to the second activity alignment off state.
In various embodiments, the computing device further comprises a traffic processing module configured to process data packets associated with the plurality of traffic flows.
In various embodiments, the first component is one of a universal serial bus (USB) device, a peripheral component interconnect (PCI) device and a PCI Express (PCIe) device.
All optional features of the methods described above may also be implemented with respect to systems described herein. For instance, in various embodiments, a system comprises a memory; an antenna; a receiver module configured to receive a first traffic flow from a first component while the system is in a first activity alignment off state; a state controller module configured to change an activity alignment state of the system to an activity alignment on state from the first activity alignment off state, based at least in part on the receiver module receiving the first traffic flow, wherein the state controller module is configured to request a plurality of components to transmit opportunistic traffics to the system while the system is in the activity alignment on state; and a masking module configured to mask a plurality of traffic flows, including the first traffic flow and one or more opportunistic traffic flows, from the state controller module in response to the system entering the activity alignment on state.
In various embodiments, the system further comprises a hysteresis timer, wherein the state controller module is configured to activate the hysteresis timer in response to the masking module masking the plurality of traffic flows from the state controller module; wherein the state controller module is configured to change the activity alignment state of the computing device to a second activity alignment off state from the activity alignment on state, based at least in part on the hysteresis timer being active for at least a first time period.
Although certain example methods, apparatus, and articles of manufacture have been described herein, the scope of coverage of the present disclosure is not limited thereto. On the contrary, the present disclosure covers all methods, apparatus, and articles of manufacture fairly falling within the scope of the appended claims either literally or under the doctrine of equivalents. For example, although the above discloses example systems including, among other
components, software or firmware executed on hardware, it should be noted that such systems are merely illustrative and should not be considered as limiting. In particular, it is contemplated that any or all of the disclosed hardware, software, and/or firmware components could be embodied exclusively in hardware, exclusively in software, exclusively in firmware or in some combination of hardware, software, and/or firmware.

Claims

CLAIMS What is claimed is:
1 . A method comprising:
entering, by a computing device, an activity alignment on state from a first activity alignment off state;
masking, by the computing device, one or more traffic flows that are received during at least a part of the activity alignment on state; and
entering, by the computing device, a second activity alignment off state from the activity alignment on state, after being in the activity alignment on state for at least a first time period, based at least in part on said masking the one or more traffic flows.
2. A method according to claim 1 , wherein said masking comprises: masking the one or more traffic flows from the state control module such that the one or more traffic flows are not detectable by a state control module.
3. A method according to claim 2, wherein said masking further comprises:
masking the one or more traffic flows such that the one or more other traffic flows are masked during at least a second time period, wherein the second time period commences in response to the computing device entering the activity alignment on state, and wherein the second time period is longer than the first time period.
4. A method according to claim 3, further comprising:
in response to entering the activity alignment on state, activating, by the computing device, a mask timer; and
ending said masking the one or more traffic flows in response to the mask timer reaching the second time period.
5. A method according to any one of claims 1 -4, further comprising: in response to entering the activity alignment on state, requesting, by the computing device, a plurality of components to transmit opportunistic traffics to the computing device.
6. A method according to any one of claims 1 -5, wherein said entering the activity alignment on state comprises:
receiving a demand traffic flow while the computing device is in the first activity alignment off state; and
in response to receiving the demand traffic flow, entering the activity alignment on state.
7. A method according to any one of claims 1 -6, further comprising: in response to entering the activity alignment on state and masking the one or more traffic flows, activating a hysteresis timer;
wherein said entering the second activity alignment off state comprises: entering the second activity alignment off state in response to the hysteresis timer completing the first time period.
8. A method according to claim 7, wherein the hysteresis timer remains active during the first time period, in spite of the computing device receiving the one or more traffic flows during the first time period, based at least in part on said masking the one or more traffic flows.
9. A computing device comprising:
a receiver module configured to receive a first traffic flow from a first component while the computing device is in a first activity alignment off state; a state controller module configured to change an activity alignment state of the computing device to an activity alignment on state from the first activity alignment off state, based at least in part on the receiver module receiving the first traffic flow, wherein the state controller module is configured to request a plurality of components to transmit opportunistic traffics to the computing device while the computing device is in the activity alignment on state; and
a masking module configured to mask a plurality of traffic flows, including the first traffic flow and one or more opportunistic traffic flows, from the state controller module in response to the computing device entering the activity alignment on state.
10. A computing device according to claim 9, further comprising:
a hysteresis timer, wherein the state controller module is configured to activate the hysteresis timer in response to the masking module masking the plurality of traffic flows from the state controller module;
wherein the state controller module is configured to change the activity alignment state of the computing device to a second activity alignment off state from the activity alignment on state, based at least in part on the hysteresis timer being active for at least a first time period.
1 1 . A computing device according to claim 10, wherein the masking device is configured to mask the plurality of traffic flows for at least a second time period that commences with the computing device entering the activity alignment on state, wherein the second time period is longer than the first time period.
12. A computing device according to any one of claims 9-1 1 , wherein the masking module is configured to mask the plurality of traffic flows such that the plurality of traffic flows are not detectable by the state control module.
13. A computing device according to any one of claims 9-12, wherein the receiver module is configured to receive, in response to the request to transmit opportunistic traffics to the computing device, one or more opportunistic traffic flows from a corresponding one or more components of the plurality of
components.
14. A computing device according to claim 13, wherein the receiver module is configured to receive at least one of the one or more opportunistic traffic flows after the change of the activity alignment state of the computing device to the second activity alignment off state.
15. A computing device according to any one of claims 9-14, further comprising:
a traffic processing module configured to process data packets associated with the plurality of traffic flows.
16. A computing device according to any one of claims 9-15, wherein the first component is one of a universal serial bus (USB) device, a peripheral component interconnect (PCI) device and a PCI Express (PCIe) device.
17. A method comprising:
receiving, by a computing device, a first traffic flow while the computing device is in an idle state;
in response to receiving the first traffic flow, entering an Opportunistic Buffer Flush & Fill (OBFF) state;
in response to entering the OBFF state, receiving one or more other traffic flows; and
masking the one or more other traffic flows.
18. A method according to claim 17, wherein said masking further comprises:
masking the one or more other traffic flows, such that (i) the one or more other traffic flows are masked during at least a first time period that commences in response to the computing device entering the OBFF state and (ii) the one or more other traffic flows are not detectable for a purpose of changing a state of the computing device.
19. A method according to claim 1 or 2, further comprising:
masking a part of the first traffic flow that is received after the computing device enters the OBFF state.
20. A method according to any one of claims 17-19, further comprising: entering, by the computing device, the idle state from the OBFF state, after being in the OBFF state for at least a first time period, based at least in part on said masking the one or more other traffic flows.
21 . A system comprising:
a memory;
an antenna;
a receiver module configured to receive a first traffic flow from a first component while the system is in a first activity alignment off state;
a state controller module configured to change an activity alignment state of the system to an activity alignment on state from the first activity alignment off state, based at least in part on the receiver module receiving the first traffic flow, wherein the state controller module is configured to request a plurality of components to transmit opportunistic traffics to the system while the system is in the activity alignment on state; and a masking module configured to mask a plurality of traffic flows, including the first traffic flow and one or more opportunistic traffic flows, from the state controller module in response to the system entering the activity alignment on state.
22. A system according to claim 21 , further comprising:
a hysteresis timer, wherein the state controller module is configured to activate the hysteresis timer in response to the masking module masking the plurality of traffic flows from the state controller module;
wherein the state controller module is configured to change the activity alignment state of the computing device to a second activity alignment off state from the activity alignment on state, based at least in part on the hysteresis timer being active for at least a first time period.
PCT/US2012/026661 2011-03-31 2012-02-24 Activity alignment algorithm by masking traffic flows WO2012134683A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP12763746.0A EP2691831B1 (en) 2011-03-31 2012-02-24 Activity alignment algorithm by masking traffic flows

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/077,727 2011-03-31
US13/077,727 US8650427B2 (en) 2011-03-31 2011-03-31 Activity alignment algorithm by masking traffic flows

Publications (2)

Publication Number Publication Date
WO2012134683A2 true WO2012134683A2 (en) 2012-10-04
WO2012134683A3 WO2012134683A3 (en) 2013-03-28

Family

ID=46928931

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/026661 WO2012134683A2 (en) 2011-03-31 2012-02-24 Activity alignment algorithm by masking traffic flows

Country Status (3)

Country Link
US (1) US8650427B2 (en)
EP (1) EP2691831B1 (en)
WO (1) WO2012134683A2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130064337A1 (en) * 2011-09-12 2013-03-14 Qualcomm Incorporated Method and Apparatus for Adaptive Hysteresis Timer Adjustments for Clock Gating
US9311145B2 (en) * 2012-06-29 2016-04-12 Intel Corporation Using platform idle duration information to notify platform devices of upcoming active periods
US9195292B2 (en) 2013-06-26 2015-11-24 Intel Corporation Controlling reduced power states using platform latency tolerance
US9891686B2 (en) 2013-09-26 2018-02-13 Intel Corporation Throttling device power
USRE49652E1 (en) 2013-12-16 2023-09-12 Qualcomm Incorporated Power saving techniques in computing devices
US20180014313A1 (en) * 2016-07-05 2018-01-11 Lg Electronics Inc. Method for transmitting data in a communication system and device therefor

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6393534B1 (en) * 1999-09-27 2002-05-21 Ati International Srl Scheduler for avoiding bank conflicts in issuing concurrent requests to main memory
US6658533B1 (en) 2000-09-21 2003-12-02 Intel Corporation Method and apparatus for write cache flush and fill mechanisms
US6662278B1 (en) * 2000-09-22 2003-12-09 Intel Corporation Adaptive throttling of memory acceses, such as throttling RDRAM accesses in a real-time system
JP3556608B2 (en) * 2001-03-29 2004-08-18 株式会社東芝 Recording / reproducing apparatus and recording / reproducing method
US6735543B2 (en) * 2001-11-29 2004-05-11 International Business Machines Corporation Method and apparatus for testing, characterizing and tuning a chip interface
US7719982B2 (en) 2005-08-31 2010-05-18 Intel Corporation Switching device utilizing flow-control management
US7725750B2 (en) * 2006-05-01 2010-05-25 Freescale Semiconductor, Inc. Method of transitioning between active mode and power-down mode in processor based system
US20090164818A1 (en) 2007-12-19 2009-06-25 Kwa Seh W Activity window notification protocol
US8286011B2 (en) * 2010-02-28 2012-10-09 Freescale Semiconductor, Inc. Method of waking processor from sleep mode

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of EP2691831A4 *

Also Published As

Publication number Publication date
EP2691831B1 (en) 2018-08-15
EP2691831A4 (en) 2014-12-31
EP2691831A2 (en) 2014-02-05
US20120254644A1 (en) 2012-10-04
WO2012134683A3 (en) 2013-03-28
US8650427B2 (en) 2014-02-11

Similar Documents

Publication Publication Date Title
US8839016B2 (en) USB self-idling techniques
EP2691831B1 (en) Activity alignment algorithm by masking traffic flows
US8601296B2 (en) Downstream device service latency reporting for power management
US10817043B2 (en) System and method for entering and exiting sleep mode in a graphics subsystem
US8661167B2 (en) DMA (direct memory access) coalescing
US9459684B2 (en) Idle duration reporting for power management
EP3659010B1 (en) Power down mode for universal flash storage (ufs)
EP3268842B1 (en) Methods and systems for coordination of operating states amongst multiple socs within a computing device
US9552051B2 (en) Block partition to minimize power leakage
US9557802B2 (en) Method of controlling SDIO device and related SDIO system and SDIO device
US10841880B2 (en) Apparatus and methods for wake-limiting with an inter-device communication link
CN111512266A (en) System, apparatus, and method for handshake protocol for low power state transitions
US20160117269A1 (en) System and method for providing universal serial bus link power management policies in a processor environment
US9612652B2 (en) Controlling power consumption by power management link
US10394309B2 (en) Power gated communication controller
US20120047390A1 (en) Apparatus and method of controlling a processor clock frequency
US7730337B2 (en) Method and apparatus for asserting a hardware pin to disable a data bus connecting a processor and a chipset during power saving state
US9329655B2 (en) Power management for data ports
WO2018000193A1 (en) Pin control method and device
US20200293081A1 (en) Systems and methods for power conservation on an audio bus through clock manipulation
WO2013013408A1 (en) Method and device for reducing power consumption of pc-architecture software radio device

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE