CHAPTER 3 FUNCTIONAL OUTLINE
PRELIMINARY
NEC confidential and Proprietary
64
(c) Descramble of ATM cell
In the cell synchronization status, the data of the cell is descrambled by the following polynomial. The range of
descramble is limited to the payload of the cell.
Polynomial G (X) = X
43
+ 1
An option mode in which the descrambling of cells can be disabled for testing purposes is supported. To set this
mode, use the CSCM bit of the MDATMR register.
(d) Dropping idle and unassigned cells
If an idle cell is detected as a result of monitoring the high-order four bytes of the header of the cell stream
extracted from a frame, the cell is not stored into the receive FIFO but is dropped. Patterns other than the
VPI/VCI field of the header to be monitored can be changed by using the DCHP register, so that an unassigned
cell can be dropped or passed along with the idle cell.
In the default, only CLP bit of the COMP field is set to “1”, therefore only idol cell is dropped. (Unassigned cell is
not dropped.)
Figure 3-19. DCHP Register
15
8
7 0
GFC3 GFC2 GFC1 GFC0 PTI2
PTI1 PTI0 CLP
GFC3 GFC2
GFC1 GFC0 PTI2 PTI1
PTI0 CLP
DCHP Register Setting Examples
COMP Field
CLP Bit
MASK Field
CLP Bit
Cells to Be Dropped
×
1
Idle and unassigned cells
1
0
Idle cells only (default)
0
0
Unassigned cells only
(e) Output of cell from ATM interface
If cell synchronization is established, a cell that does not fit in the pattern specified by the DCHP register is stored
to the receive FIFO as a valid cell. The stored cell is transferred to the ATM device via the ATM interface. If a
cell is received when the receive FIFO is full, a receive FIFO overflow error occurs and that cell is dropped. The
occurrence of the receive FIFO overflow error can be used as an interrupt cause.
COMP
MASK
Содержание NEASCOT-P65
Страница 4: ...PRELIMINARY NEC confidential and Proprietary 4 MEMO ...
Страница 8: ...PRELIMINARY 8 MEMO ...
Страница 15: ...PRELIMINARY NEC confidential and Proprietary 15 CHAPTER 2 PIN FUNCTION 2 1 Pin Configuration TBD ...
Страница 16: ...CHAPTER 2 PIN FUNCTION PRELIMINARY NEC confidential and Proprietary 16 Pin Arrangement Table TBD ...
Страница 33: ...CHAPTER 2 PIN FUNCTION PRELIMINARY NEC confidential and Proprietary 33 2 2 13 Handling Unused Pins TBD ...
Страница 34: ...CHAPTER 2 PIN FUNCTION PRELIMINARY NEC confidential and Proprietary 34 2 2 14 Initial States of Each Pin TBD ...
Страница 35: ...PRELIMINARY NEC confidential and Proprietary 35 MEMO ...
Страница 114: ...CHAPTER 4 INTERFACES PRELIMINARY NEC confidential and Proprietary 114 7 Connection example TBD ...
Страница 135: ...CHAPTER 4 INTERFACES PRELIMINARY NEC confidential and Proprietary 135 ...
Страница 166: ...CHAPTER 5 REGISTERS PRELIMINARY NEC confidential and Proprietary 166 5 2 Register summary ...
Страница 167: ...CHAPTER 5 REGISTERS PRELIMINARY NEC confidential and Proprietary 167 ...
Страница 168: ...CHAPTER 5 REGISTERS PRELIMINARY NEC confidential and Proprietary 168 ...
Страница 303: ...CHAPTER 5 REGISTERS PRELIMINARY NEC confidential and Proprietary 303 MEMO ...
Страница 317: ...CHAPTER 6 JTAG BOUNDARY SCAN PRELIMINARY NEC confidential and Proprietary 318 MEMO ...