Difference between pages "4G wireless technology developments" and "Transactional memory in hardware"

From DolceraWiki
(Difference between pages)
Jump to: navigation, search
(WiMAX)
 
 
Line 1: Line 1:
{{TOCrightEx}}
+
==Background==
== Overview ==
+
===Transactional memory===
===Definition of 4G===
+
*Transactional memory is a general and flexible way to allow programs to read and modify disparate primary memory locations atomically as a single operation, much as a database transaction can atomically modify many records on disk.
The 4G will be a fully IP-based integrated system of systems and network of networks achieved after the convergence of wired and wireless networks as well as computer, consumer electronics, communication technology, and several other convergences that will be capable of providing 100 Mbit/s and 1 Gbit/s, respectively, in outdoor and indoor environments with end-to-end QoS and high security, offering any kind of services anytime, anywhere, at affordable cost and one billing.
+
*[http://en.wikipedia.org/wiki/Transactional_memory Transactional memory] attempts to simplify parallel programming by allowing a group of load and store instructions to execute in an atomic way. Transactional memory is a concurrency control mechanism analogous to database transactions for controlling access to shared memory in concurrent computing. A transaction is a piece of code that executes a series of reads and writes to shared memory.
 +
*Transactional memory (TM) supports code sections that are executed atomically, i.e., so that they appear to be executed one at a time, with no interleaving between their steps. TM significantly reduces the difficulty of writing correct concurrent programs. A good TM implementation avoids synchronization between concurrently executed transactional sections unless they actually conflict. TM can significantly improve the performance and scalability of concurrent programs, as well as makes them easier to write, understand and maintain.
 +
*[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220070156994%22.PGNR.&OS=DN/20070156994&RS=DN/20070156994 Transactional memory] generally refers to a synchronization model that allows multiple threads to concurrently access a shared resource (such as a data structure stored in memory) without acquiring a lock as long as the accesses are non-conflicting, for example, as long as the accesses are directed to different portions of the shared resource.  
 +
'''[[More details]]'''
  
According to the 4G working groups, the infrastructure and the terminals will have almost all the standards from 2G to 3G implemented. The infrastructure will however only be packet based, all-IP. The system will also serve as an open platform where the new innovations can go with it.
+
----
  
=== 4G standards ===
+
===Transactional programming models===
* WiMAX
+
*[http://research.sun.com/spotlight/2007/2007-08-13_transactional_memory.html Transactional programming models] can be supported in software using software-based transactional memory (STM), in hardware using hardware- based transactional memory (HTM), or in a combination of the two (Hybrid TM, or HyTM).
* WiBro
+
**[http://en.wikipedia.org/wiki/Software_transactional_memory Software based Transactional memory] (STM) can allow sequences of concurrent operations to be combined into atomic transactions, thereby reducing the complexity of both programming and verification. STM is a scheme for concurrent programming with multiple threads that uses transactions similar to those used in databases.
* 3GPP Long Term Evolution
+
**Hardware based Transactional memory (HTM) system requires no read or write barriers within the transaction code. The hardware manages data versions and tracks conflicts transparently.
* HSOPA
+
**[http://www.eecs.harvard.edu/~fedorova/papers/asplos165-damron.pdf Hybrid Transactional memory] (HyTM) implements Transactional memory in software so that it can use best-effort Hardware Transactional memory (HTM) to boost performance but does not depend on HTM.
* 3GPP2 Ultra Mobile Broadband
+
  
===Services where 4G is used===
 
*Wireless broadband access
 
*Multimedia Messaging Service
 
*Video chat
 
*Mobile TV
 
*High definition TV content,
 
*DVB
 
*Minimal service like voice and data
 
  
=== 4G objectives===
+
===Software based Transactional memory===
* A spectrally efficient system (in bits/s/Hz and bit/s/Hz/site)
+
*Software transactional memory (STM) is implemented in software. All speculative STM transactional data is stored in the system memory and indicated to be in a non-committed state. When the STM transaction commits, any data the transaction writes is indicated as committed and subsequently available to other threads and transactions. In certain STM systems, a flag may be set to indicate the data as committed and accessible and available in memory to other transactions.
* High network capacity
+
* A nominal data rate of 100 Mbit/s at high speeds and 1 Gbit/s at stationary conditions as defined by the ITU-R
+
* A data rate of at least 100 Mbit/s between any two points in the world
+
* Smooth handoff across heterogeneous network
+
* Seamless connectivity and global roaming across multiple networks
+
* High quality of service for next generation multimedia support (real time audio, high speed data, HDTV video content, mobile TV, etc)
+
* Interoperability with the existing wireless standards
+
* An all IP, packet switched network
+
  
==Technology overview==
+
====DracoSTM====
Mindmap below shows the overview of emerging technologies in 4G
+
*[http://eces.colorado.edu/~gottschl/dracoSTM/pubs/lcsd07-dracostm.pdf DracoSTM] is a high performance lock-based C++ Software Transactional memory research library. DracoSTM uses only native object-oriented language semantics, increasing its intuitiveness for developers while maintaining high programmability via automatic handling of composition, locks and transaction termination.
 +
*DracoSTM is a lock-based STM system. At its core, DracoSTM uses one lock per thread to implement transactional reads and writes. This allows multiple transactions to simultaneously read and write without blocking other transactions’ progress.
  
{|border="2" cellspacing="2" cellpadding="4" width="75%" align = "center"
 
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Parameter'''
 
|align = "center" bgcolor = "#00CCFF" colspan = "5"|'''4G'''
 
|-
 
|align = "center" bgcolor = "#00CCFF"|'''WiMAX'''
 
|align = "center" bgcolor = "#00CCFF"|'''WiBro'''
 
|align = "center" bgcolor = "#00CCFF"|'''3GPP LTE'''
 
|align = "center" bgcolor = "#00CCFF"|'''HSOPA'''
 
|align = "center" bgcolor = "#00CCFF"|'''3GPP2 UMB'''
 
|-
 
|align = "center" bgcolor = "#00CCFF"|'''Logo'''
 
|align = "center"| 
 
[[Image:wimax_01.jpeg|70px]]
 
  
|align = "center"| 
+
====Dynamic STM (DSTM)====
[[Image:wibro_02.jpeg|70px]]
+
*[http://research.sun.com/scalable/pubs/PODC03.pdf Dynamic Software Transactional Memory (DSTM)] is a low-level application programming interface (API) for syn-chronizing shared data without using locks.
 +
*DSTM supports dynamic-sized data structures. DSTM has non-blocking implementation. The non-blocking property is obstruction-freedom. Dynamic means that the set of locations accessed by the transaction is not known in advance and is determined during its execution.
 +
*DSTM techniques allow transactions and transactional objects to be created dynamically.Transactions may determine the sequence of objects to access based on the values observed in objects accessed earlier in the same transaction. DSTM is well suited to the implementation of dynamic-sized data structures such as lists and trees.
  
|align = "center"| 
+
====Dynamic Software Transactional Memory 2.0 (DSTM2)====
[[Image:lte_03.jpeg|100px]]
+
*[http://research.sun.com/scalable/pubs/OOPSLA2006.pdf DSTM2] is a Java-based software library that provides a flexible framework for implementing STM. DSTM2 significantly improves the programming interface of its predecessor DSTM. The code is provided in Java libraries and any Java programmer can use it easily. DSTM2 allows researchers to plug in their STM implementations and directly compare them with others.
 +
*The DSTM2 library assumes that multiple concurrent threads share data objects. The DSTM2 library provides a new kind of thread that can execute transactions, which access shared atomic objects. DSTM2 threads provide methods for creating new atomic classes and executing transactions.
  
|align = "center"| 
+
====Nonblocking Software Transactional Memory====
[[Image:hsopa_04.jpeg|100px]]
+
*[http://research.sun.com/scalable/pubs/PPoPP2008-NBSTM.pdf Nonblocking STMs] are obstruction free. Nonblocking Software Transactional Memory guarantees that, if a transaction is repeatedly retried and eventually encounters no interference from other transactions, then eventually the transaction commits successfully.
 +
*Nonblocking STM “steals” ownership of a memory location from another transaction, rather than waiting for the other transaction to explicitly release it. Accessing stolen locations is more complicated and expensive than accessing unstolen ones, but stealing is worthwhile in order to avoid waiting for another transaction that is delayed for a long time.
  
|align = "center"| 
+
====<span style="color:#C41E3A">Like this report?</span>====
[[Image:umb_05.jpeg|70px]]
+
 
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Access scheme'''
+
|align = "center"|OFDMA
+
|align = "center"|OFDMA
+
|align = "center"|SC-FDMA Uplink<br>OFDMA Downlink
+
|align = "center"|SC-FDMA Uplink<br>OFDMA Downlink
+
|align = "center"|OFDMA
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Duplex system'''
+
|align = "center"|TDD/FDD
+
|align = "center"|TDD
+
|align = "center"|TDD/FDD
+
|align = "center"|FDD
+
|align = "center"|FDD
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Channel Bandwidth'''
+
|align = "center"|3.5, 5, 7, 8.75, 10, 15, 20MHz
+
|align = "center"|8.75MHz
+
|align = "center"|1.25, 1.6, 2.5, 5, 10, 15 and 20 MHz
+
|align = "center"|1.25 MHz to 20 MHz
+
|align = "center"|1.25 - 20 MHz
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''FFT size'''
+
|align = "center"|128, 256, 512, 1024, 2048
+
|align = "center"|1024
+
|align = "center"|128, 256, 512, 1024, 1536, 2048
+
|align = "center"|128, 256, 512, 1024, 1536, 2049
+
|align = "center"|N/A
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Data rate'''
+
|align = "center"|70 Mbps
+
|align = "center"|30 - 50 Mbps
+
|align = "center"|100 Mbps Downlink<br>50 Mbps Uplink
+
|align = "center"|14.4 Mbps
+
|align = "center"|275 Mbps Downlink <br>75 Mbps Uplink
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Antenna System'''
+
|align = "center"|MIMO-AAS smart antenna subsystems.<br>(6 - antenna array)
+
|align = "center"|MIMO-AAS smart antenna subsystems.<br>(6 - antenna array)
+
|align = "center"|MIMO-AAS smart antenna subsystems.<br>(4 - antenna array)
+
|align = "center"|MIMO-AAS smart antenna subsystems.
+
|align = "center"|MIMO-AAS smart antenna subsystems.
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''FEC scheme'''
+
|align = "center"|Convolution Code<br>Convolution Turbo Code
+
|align = "center"|Convolution Code<br>Convolution Turbo Code
+
|align = "center"|Convolution Code<br>Turbo Code
+
|align = "center"|N/A
+
|align = "center"|N/A
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Modulation'''
+
|align = "center"|BPSK, QPSK, 16QAM, 64QAM
+
|align = "center"|QPSK, 16QAM, 64QAM
+
|align = "center"|QPSK, 8PSK 16 QAM
+
|align = "center"|16 QAM
+
|align = "center"|BPSK, 8PSK, QPSK, 16QAM, 64QAM
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Frequency band'''
+
|align = "center"|2.3GHz <nowiki>~</nowiki> 2.4GHz
+
|align = "center"|2.3GHz <nowiki>~</nowiki> 2.4GHz
+
|align = "center"|2010MHz <nowiki>~</nowiki> 2025MHz
+
|align = "center"|N/A
+
|align = "center"|450 MHz to 3.6GHz
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Cell coverage'''
+
|align = "center"|10 KM
+
|align = "center"|1 KM
+
|align = "center"|5 - 100 KM
+
|align = "center"|N/A
+
|align = "center"|N/A
+
|-
+
|}
+
 
+
===Mobile technology roadmap===
+
[[Image:roadmap.jpg|700px|center|thumb|<font size = "3">'''Roadmap'''</font>]]
+
 
+
[[Image:roadmap_mobile wimax.jpg|700px|center|thumb| [http://images.google.co.in/imgres?imgurl=http://www.ixbt.com/mobile/itogi2006/wimax/Evolution_big.jpg&imgrefurl=http://forums.whirlpool.net.au/forum-replies-archive.cfm/765653.html&h=699&w=931&sz=91&hl=en&start=5&um=1&tbnid=vTRyRja1XS2n6M:&tbnh=110&tbnw=147&prev=/images%3Fq%3Dwimax%2Broadmap%26svnum%3D10%26um%3D1%26hl%3Den%26client%3Dfirefox-a%26rls%3Dorg.mozilla:en-US:official%26sa%3DG <font size = "3">'''Roadmap'''</font>]]]
+
 
+
=== Dashboard Preview ===
+
 
+
[[Image:patent chart.jpeg|1000 px|center|thumb|Preview of company statistics per protocol]]
+
 
+
[[Image:patents.jpeg|1000 px|center|thumb|Preview of patents per protocol]]
+
 
+
[[Image:product.jpeg|1000 px|center|thumb|Preview of the products for particular company]]
+
 
+
==<span style="color:#C41E3A">Like this report?</span>==
+
 
<p align="center"> '''This is only a sample report with brief analysis''' <br>
 
<p align="center"> '''This is only a sample report with brief analysis''' <br>
 
'''Dolcera can provide a comprehensive report customized to your needs'''</p>
 
'''Dolcera can provide a comprehensive report customized to your needs'''</p>
Line 168: Line 57:
 
|}
 
|}
 
<br>
 
<br>
==WiMAX==
+
====[http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=3&f=G&l=50&co1=AND&d=PTXT&s1=transactional.TI.&s2=memory.TI.&OS=TTL/transactional+AND+TTL/memory&RS=TTL/transactional+AND+TTL/memory Non-blocking conditions]====
  
===[http://client.dolcera.com/dashboard/dashboard.html?workfile_id=54 '''''WiMAX Dashboard''''']===
+
=====Lock-free transactional memory=====
 +
*'''Lock-free transactional memory:''' A transactional memory implementation is lock-free if all its operations are lock-free and if some thread repeatedly attempts to commit transactions, then eventually some thread performs a successful commit.
 +
*'''Lock-freedom:''' An implementation of an operation is lock-free if after a finite number of steps of any execution of that operation, some operation execution completes (irrespective of the timing behavior of any concurrent operation executions).
  
* WiMAX is defined as "Worldwide Interoperability for Microwave Access" by the WiMAX Forum, formed in June 2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as WirelessMAN. WiMAX aims to provide wireless data over long distances, in a variety of different ways, from point to point links to full mobile cellular type access. In practical terms this enables a user, for example, to browse the Internet on a laptop computer without physically connecting the laptop to a wall jack.
+
=====Wait-free transactional memory=====
 +
*'''Wait-free transactional memory:''' A transactional memory implementation is wait-free if all its operations are wait-free and any thread that repeatedly attempts to commit transactions eventually performs a successful commit.
 +
*'''Wait-freedom''': An implementation of an operation is wait-free if after a finite number of steps of any execution of that operation, that operation execution completes (irrespective of the timing behavior of any concurrent operation executions).
  
'''[[Background Information]]'''
+
=====Obstruction-free transactional memory=====
 +
*'''Obstruction-free transactional memory:''' A transactional memory implementation is obstruction-free if all its operations are obstruction-free and if some thread repeatedly attempts to commit transactions, and runs in isolation after some point, then it eventually performs a successful commit.
 +
*'''Obstruction-freedom:''' An implementation of an operation is obstruction-free if every operation execution that executes in isolation after some point completes after a finite number of steps.
  
'''Spectrum coverage by geography'''
+
===Hardware based Transactional memory===
Image below shows the spectrum for WiMAX users World wide.
+
*HTM comprises hardware transactions implemented entirely in processor hardware. For hardware transactions, data may be stored in hardware registers and cache, such that all cache actions are done atomically in hardware and data in the HTM is only written to the main memory upon committing the transaction. The HTM holds all the speculative writes without propagating to the main system memory, such as a Random Access Memory (RAM) device, until the transaction commits. If the hardware transaction aborts, then the cache lines holding the tentative writes in the HTM are discarded. HTM hardware transactions may utilize cache coherency protocols to detect and manage conflicts between HTM hardware transactions. The cache coherency protocols keep track of accesses within a hardware transaction. If two hardware transactions are accessing a same memory location, then the HTM aborts one transaction if there is a conflict, else the transaction's changes may be committed to the system memory.
[[Image:Spectrum1.jpg|center|800px|thumb|<font size = "3">'''Spectrum for WiMAX users World wide'''</font>]]
+
*HTM transactions usually require less overhead then STM transactions because HTM transactions occur entirely in hardware. HTM transactions may be limited to smaller transactions due to hardware limitations, whereas STM transactions can handle large and longer transactions. [http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220070143287%22.PGNR.&OS=DN/20070143287&RS=DN/20070143287 Source]
 +
*The multi-core processor '''Rock''' supports [http://research.sun.com/scalable/pubs/TRANSACT2008-ATMTP-Apps.pdf Hardware Transactional Memory] (HTM).
 +
*'''Rock'''’s HTM feature is an important but modest first step in integrating HTM support into a mainstream commercial multi-core processor.
 +
*'''Rock''' supports HTM with two new instructions, chkpt and commit, and a new checkpoint status (cps) register. A transaction is started by a chkpt instruction, and is terminated by either a commit instruction or the failure of the transaction. If a transaction fails, some indication of the cause of failure is stored in the cps register, and control is transferred to the PC-relative offset (fail pc) specified by the chkpt instruction.
  
'''Market research data:'''
+
====Adaptive Transactional Memory Test Platform====
* Worldwide WiMAX equipment revenues are forecast to reach $3.26 billion in 2009
+
*The [http://www.cs.wisc.edu/gems/doc/gems-wiki/moin.cgi/ATMTP Adaptive Transactional Memory Test Platform] (ATMTP) provides a first-order approximation of the success and failure characteristics of transactions on '''Rock'''. ATMTP will allow developers to test and tune their code for '''Rock'''.
* Worldwide outdoor wireless mesh access node sales are forecast to reach $1.17 billion in 2009
+
*ATMTP correctly models '''Rock'''’s HTM-related instructions, and fairly accurately reflects most of the circumstances that cause '''Rock''' transactions to fail. ATMTP provides a good platform for experimenting with HTM-based code that will behave similarly on '''Rock'''.
* Samsung leads overall WiMAX equipment revenue share in 3Q06, ahead of Alvarion, Airspan, and Aperto Networks
+
* Strix Systems leads overall outdoor mesh revenue market share in 3Q06, just ahead of Tropos Networks and BelAir Networks
+
* 35% of WiMAX equipment sales come from Asia Pacific, 30% from EMEA, 20% from North America, and 14% from CALA
+
* 49% of wireless mesh access node sales come from North America, 25% from EMEA, 18% from Asia Pacific, and 8% from CALA
+
* 802.16 standards The first 802.16 standard was approved in December 2001. It delivered a standard for point to multipoint Broadband Wireless transmission in the 10-66 GHz band, with only a Line of Sight (LOS) capability. It uses a single carrier (SC) physical (PHY) standard. [http://www.bbwexchange.com/pubs/2006/12/05/page1421-371393.asp Source]
+
  
 +
====Unbounded Hardware Transactional Memory (UHTM)====
 +
*[http://supertech.csail.mit.edu/papers/xaction.pdf UHTM] is commited in-cache. When not possible, hardware “spills” transaction information into memory, allowing (essentially) unbounded transactions. UTM is more appealing for programmer, but is significantly more complicated. Unbounded means that there is no limit on the number of locations accessed by the transaction.
  
===Standards===
+
====Best-effort Hardware Transactional Memory====
# [http://standards.ieee.org/getieee802/download/802.16.2-2004.pdf IEEE 802.16-2004 (802.16d)] addresses only fixed systems
+
*Best-effort Hardware Transactional Memory transactions are committed in-cache and aborted if they don’t fit. Best-effort Hardware Transactional Memory has simple design.Best-effort Hardware Transactional Memory violates Principle of Least Astonishment. Programmer should not have to think about cache mapping, cache size, cache organization, etc.
# [http://standards.ieee.org/getieee802/download/802.16e-2005.pdf IEEE Std 802.16e-2005], also called mobile WiMAX
+
*[http://research.sun.com/scalable/pubs/TRANSACT2008-ATMTP-Apps.pdf Best-effort HTM] does not guarantee to support transactions of any size and duration, and thus is free to simply abort transactions that exceed on-chip resources for HTM or encounter difficult events or situations.
#* 802.16e also bring Multiple Antenna Support through Multiple-input multiple-output communications. This brings potential benefits in terms of coverage, self installation, power consumption, frequency re-use and bandwidth efficiency. 802.16e also adds a capability for full mobility support.
+
# WiMAX II, 802.16m will be proposed for IMT-Advanced 4G (future development)
+
#* 3GPP LTE and WiMAX-m are concentrating much effort on MIMO-AAS, mobile multi-hop relay networking and related developments needed to deliver 10X and higher Co-Channel reuse multiples.
+
  
'''IEEE 802.16e-2005 improves upon IEEE 802.16-2004 by:'''
+
====Split Hardware Transaction (SpHT)====
 +
*The [http://research.sun.com/scalable/pubs/PPoPP2008-SpHT.pdf Split Hardware Transaction (SpHT])uses minimal software support to combine multiple segments of an atomic block, each executed using a separate hardware transaction, into one atomic operation. The idea of segmenting transactions can be used for many purposes, including nesting, local retry, or Else, and user-level thread scheduling. SpHT overcomes the limited expressive power of best-effort HTM while imposing overheads dramatically lower than STM and preserving useful guarantees such as strong atomicity provided by the underlying HTM.
  
* Scaling of the Fast Fourier Transform (FFT) to the channel bandwidth in order to keep the carrier spacing constant across different channel bandwidths (1.25-20 MHz). Constant carrier spacing results in a higher spectrum efficiency in wide channels, and a cost reduction in narrow channels. Also known as Scalable OFDMA (SOFDMA).
+
====Virtualized Transactional Memory (VTM)====
* Improving NLOS coverage by utilizing advanced antenna diversity schemes, and hybrid-Automatic Retransmission Request (hARQ)
+
*[http://www.cs.wisc.edu/trans-memory/misc-papers/moir:hybrid-tm:tr:2005.pdf Virtualized TM (VTM)] maintains atomicity and isolation even if a transaction is interrupted by a cache overflow or a system event. VTM maps the key bookkeeping data structures for transactional execution (read set, write set, write buffer or undo-log) to virtual memory, which is effectively unbounded and is unaffected by system interruptions. The hardware caches hold the working set of these data structures. VTM also suggested the use of hardware signatures to avoid redundant searches through structures in virtual memory.
* Improving coverage by introducing Adaptive Antenna Systems (AAS) and Multiple Input Multiple Output (MIMO) technology
+
* Increasing system gain by use of denser sub-channelization, thereby improving indoor penetration
+
* Introducing high-performance coding techniques such as Turbo Coding and Low-Density Parity Check (LDPC), enhancing security and NLOS performance
+
* Introducing downlink sub-channelization, allowing administrators to trade coverage for capacity or vice versa
+
* Enhanced Fast Fourier Transform algorithm can tolerate larger delay spreads, increasing resistance to multipath interference
+
* Adding an extra QoS class (enhanced real-time Polling Service) more appropriate for VoIP applications.
+
* Adding support for mobility (soft and hard handover between base stations). This is seen as one of the most important aspects of 802.16e-2005, and is the very basis of 'Mobile WiMAX'. [http://en.wikipedia.org/wiki/WiMAX Source]
+
  
'''Technology mapping parameters'''
+
====[http://research.microsoft.com/~larus/Papers/p80-larus.pdf Conflict detection]====
[[Image:protocol.jpg|center|800 px|thumbnail| '''IEEE 802.16e Protocol Stack''']]
+
*HTM systems rely on a computer’s cache hierarchy and the cache coherence protocol to implement conflict detection. Caches observe all reads and writes issued by a processor, can buffer a significant amount of data, and can be searched efficiently because of their associative organization. All HTMs modify the first-level caches, but the approach extends to higher-level caches, both private and shared.
 +
*Conflict detection occurs as other processors receive the coherence messages from the committing transaction. Hardware looks up the received block address in the local caches. If the block is in a cache and has its R or W bit set, there is a read-write or a  write-write conflict between the committing and the local transaction. The hardware signals a software handler, which aborts the local transaction and potentially retries it after a backoff period.
 +
*'''Direct memory updates:''' For direct updates, the hardware transparently logs the original value in a memory block before its first modification by a transaction. If the transaction aborts, the log is used to undo any memory updates.
 +
*'''Early conflict detection :''' For early conflict detection, the hardware acquires exclusive access to the cache block on the first write and maintains it until the transaction commits.
  
 +
===Hybrid Transactional memory (HyTM)===
 +
*The HyTM approach is to provide an STM implementation that does not depend on hardware support beyond what is widely available today, and also to provide the ability to execute transactions using whatever HTM support is available in such a way that the two types of transactions can coexist correctly.
 +
*The key idea to achieving correct interaction between software transactions and hardware transactions is to augment hardware transactions with additional code that ensures that the transaction does not commit if it conflicts with an ongoing software transaction.
  
'''Content delivery'''
+
====Phased Transactional Memory (PhTM)====
 +
*[http://research.sun.com/scalable/pubs/TRANSACT2007-PhTM.pdf Phased Transactional Memory (PhTM])supports switching between different “phases”, each implemented by a different form of transactional memory support. PhTM allows to adapt between a variety of different transactional memory implementations.
  
'''QoS service for WiMAX Content Delivery as per standard'''
+
====Nonblocking Zero-Indirection Transactional Memory (NZTM)====
 +
*[http://research.sun.com/scalable/pubs/TRANSACT2007-NZTM.pdf Nonblocking Zero-Indirection Transactional Memory (NZTM)] is a nonblocking, zero-indirection object-based hybrid transactional memory system. NZTM can execute transactions using best-effort hardware transactional memory or by using compatible software transactional memory system.
  
{|border="2" cellspacing="4" cellpadding="4" width="75%" align="center"
+
====[http://research.microsoft.com/~larus/Papers/p80-larus.pdf Hardware-Accelerated STM (HASTM)]====
|align = "center" bgcolor = "#00CCFF" rowspan = "3"|'''Service'''
+
*Hardware-Accelerated STM (HASTM) system proposes hardware support to reduce the overhead of STM instrumentation. The supplementary hardware allows software to build fast filters that could accelerate the common case of read set maintenance.
|align = "center" bgcolor = "#00CCFF"|'''UGS'''
+
*HASTM provides the STM with two capabilities through per-thread mark bits at the granularity of cache blocks.
|align = "center" bgcolor = "#00CCFF"|'''RT-VR'''
+
*'''Conflict detection:''' Software can check if a mark bit was previously set for a given block of memory and that no other thread wrote to the block since it was marked.
|align = "center" bgcolor = "#00CCFF"|'''NRT-VR'''
+
*'''Validation:''' Software can query if potentially there were writes by other threads to any of the memory blocks that the thread marked.
|align = "center" bgcolor = "#00CCFF"|'''BE'''
+
|align = "center" bgcolor = "#00CCFF"|'''ERT-VR'''
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Unsolicited Grant Service'''
+
|align = "center" bgcolor = "#00CCFF"|'''Real-Time Variable Rate Service'''
+
|align = "center" bgcolor = "#00CCFF"|'''Non-Real-Time Variable Rate service'''
+
|align = "center" bgcolor = "#00CCFF"|'''Best Efforts Service'''
+
|align = "center" bgcolor = "#00CCFF"|'''Extended Real-Time Variable Rate Service.'''
+
|-
+
|valign = "top"|Real time service (e.g.VoIP) generating fixed data rate. Data can be provided as either fixed or variable length PDU.
+
|valign = "top"|Real-time service (e.g.MPEG) applications with variable bit rates. Require guaranteed data rate and delay.
+
|valign = "top"|Non Real time service (FTP) for guaranted data rate.This service is insensetive to delays.It is desirable in certain cases to limit the data rate of these services to some maximum rate.
+
|valign = "top"|The intent of the BE service grant scheduling type is to provide efficient service for best effort traffic in the
+
uplink.
+
|valign = "top"|This service is to support real-time applications with variable data-rates, which require guaranteed data and delay, for example VoIP with silence suppression.
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Parameters'''
+
|valign = "top"|1) Minimum reserved traffic rate <br>2) Maximum Latency <br>3)Request/Transmission Policy<br>4) Unsolicited Grant Interval
+
|valign = "top"|1) Maximum Latency <br>2) Minimum Reserved Traffic Rate <br>3) Maximum Sustained Traffic Rate<br>4) Traffic priority <br>5)Request/Transmission policy <br>6) Unsolicited Polling Interval
+
|valign = "top"|1) Minimum Reserved Traffic Rate <br>2) Maximum Sustained Traffic Rate <br>3) Traffic priority <br>4)Request/Transmission policy
+
|valign = "top"|1) Maximum Sustained Traffic Rate<br>2) Traffic priority<br>3)Request/Transmission policy
+
|valign = "top"|1) Maximum Latency <br>Tolerated Jitter<br>2) Minimum Reserved Traffic Rate <br>3) Maximum Sustained Traffic Rate <br>4) Traffic Priority <br>5)Request/Transmission Policy<br>6) Unsolicited Grant Interval
+
|-
+
|}
+
  
 +
====[http://research.microsoft.com/~larus/Papers/p80-larus.pdf Signature-Accelerated STM (SigTM)]====
 +
*[http://portal.acm.org/citation.cfm?id=1250673 Signature-Accelerated STM (SigTM)]uses hardware signatures to encode the read set and write set for software transactions. A hardware Bloom filter outside of the caches computes the signatures.b Software instrumentation provides the filters with the addresses of the objects read or written within a transaction. To detect conflicts, hardware in the computer monitors coherence traffic for requests for exclusive accesses to a cache block, which indicates a memory update.
 +
*The hardware tests if the address in a request is potentially in a transaction’s read or write set by examining the transaction’s signatures. If so, the memory reference is a potential conflict and the STM can either abort a transaction or turn to software validation.
  
'''WiMAX Network Reference Model'''
+
----
  
'''Access Service network(ASN)''': The ASN coordinates traffic across multiple Base Transceiver Stations (BTS) and supports security,    handoffs and Quality of Service (QoS).
 
* The ASN interfaces the BTS and the all-IP core network—the CSN. Typically the ASN includes numerous BTSs with one or more ASN gateways.
 
* The ASN manages radio resources, MS access, mobility, security and QoS. It acts as a relay for the CSN for IP address allocation and AAA functions.
 
  
  
[[Image:ASN.jpg|center|1500 px|thumbnail|<font size = "3">'''WiMAX Network Reference Model '''</font>]]
+
==Search strategy==
 
+
===Search concepts===
{|border="2" cellspacing="0" cellpadding="4" width="78% " align="center"
+
{|border="2" cellspacing="0" cellpadding="4" width="100%" align="left"
|align = "center" bgcolor = "#00CCFF"|'''Interface'''
+
|bgcolor = "#FFFF99"|'''Transactional memory'''
|align = "center" bgcolor = "#00CCFF"|'''Description'''
+
|bgcolor = "#FFFF99"|'''Atomic memory transactions'''
|align = "center" bgcolor = "#00CCFF"|'''Functionality'''
+
|bgcolor = "#FFFF99"|'''Concurrency control'''
 +
|bgcolor = "#FFFF99"|'''Shared memory access'''
 
|-
 
|-
|align = "justify" bgcolor = "#00CCFF"|'''R1'''
+
|transactional memory
|align = "justify"|Interface between the MS and the ASN
+
|atomic memory transactions
|align = "justify"|Air interface
+
|concurrency control
 +
|shared memory synchronization
 
|-
 
|-
|align = "justify" bgcolor = "#00CCFF"|'''R2'''
+
|transactional execution AND memory
|align = "justify"|Interface between the MS and the CSN
+
|atomically memory accesses
|align = "justify"|AAA (Authentication, Authorization, & Accounting ), IP host configuration, mobility management
+
|concurrent computing
 +
|shared memory access
 
|-
 
|-
|align = "justify" bgcolor = "#00CCFF"|'''R3'''
+
|hybrid transactional memory
|align = "justify"|Interface between the ASN and the CSN
+
|  
|align = "justify"|AAA, policy enforcement, mobility management
+
|  
 +
|  
 
|-
 
|-
|align = "justify" bgcolor = "#00CCFF"|'''R4'''
+
|software transactional memory
|align = "justify"|Interface between the ASNs
+
|  
|align = "justify"|Mobility management
+
|  
 +
|  
 
|-
 
|-
|align = "justify" bgcolor = "#00CCFF"|'''R5'''
+
|hardware transactional memory
|align = "justify"|Interface between the CSNs
+
|  
|align = "justify"|Internetworking,roaming
+
|  
 +
|  
 
|-
 
|-
|align = "justify" bgcolor = "#00CCFF"|'''R6'''
+
|}<br clear="all">
|align = "justify"|Interface between BTS and ASN gateways
+
|align = "justify"|IP tunnel management to establish and release MS connection
+
|-
+
|align = "justify" bgcolor = "#00CCFF"|'''R8'''
+
|align = "justify"|Interface between the BTSs
+
|align = "justify"|Handoffs
+
|-
+
|}
+
 
+
'''ASN Gateway functions'''
+
* Service Flow Authorization
+
* Authentication and key distribution
+
* Session/Context maintenance
+
* Handover co-ordination & Mobility management
+
* Paging control
+
* Accounting client
+
* DHCP proxy/relay
+
* MIP client/FA
+
* Data-path management and (re)-anchoring
+
* Policy Enforcement
+
* Multiple BS, ASN, CSN configurations
+
  
===Companies===
+
----
*[[List of companies]]
+
  
===Products===
+
===Search strings===
Table below shows some of the products using WiMAX technology.
+
{|border="2" cellspacing="0" cellpadding="4" width="100%" align="left"
{|border="2" cellspacing="2" cellpadding="4" width="75%" align = "center"
+
|align = "center" bgcolor = "#FFFF99"|'''Concepts'''
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Company'''
+
|align = "center" bgcolor = "#FFFF99"|'''Scope'''
|align = "center" bgcolor = "#00CCFF" colspan = "2"|'''Product'''
+
|align = "center" bgcolor = "#FFFF99"|'''Search string'''
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Image'''
+
|align = "center" bgcolor = "#FFFF99"|'''No of hits'''
 +
|align = "center" bgcolor = "#FFFF99"|''' '''
 
|-
 
|-
|align = "center" bgcolor = "#00CCFF"|'''Main category'''
+
|align = "center" bgcolor = "#FFFF99"|'''Transactional memory'''
|align = "center" bgcolor = "#00CCFF"|'''Sub category'''
+
|rowspan = "3"|'''Search scope:''' US Granted US Applications EP-A EP-B WO JP DE-C,B DE-A DE-T DE-U GB-A FR-A; <br>'''Claims, Title or Abstract'''<br>'''Years: '''1836-2008
 +
|(transactional ADJ memory) OR ((transactional ADJ execution) SAME memory)
 +
|align = "center"|'''167'''
 +
|
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://www.intel.com/network/connectivity/products/wireless/IntelWiMAXConnection2250.pdf Intel]</u></font>
+
|align = "center" bgcolor = "#FFFF99"|'''Other Keywords'''
|align = "center"|System on Chip (SoC)
+
|(atomic<nowiki>*</nowiki>4 NEAR2 memory NEAR2 (transaction<nowiki>*</nowiki>1 OR access<nowiki>*</nowiki>2)) OR (((concurrency ADJ control) OR (concurrent ADJ computing)) WITH ((shared ADJ memory) AND (synchronization OR access<nowiki>*</nowiki>2)))
|align = "center"|WiMAX Connection 2250
+
|align = "center"|'''24'''
|align = "center"|&nbsp;
+
|  
[[Image:Document2_01.jpeg|125 px]]
+
 
+
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://www.redlinecommunications.com/products/RedMAX_SUI.html Redline Communication]</u></font>
+
|align = "center" bgcolor = "#FFFF99"|'''Final'''
|align = "center"|Subscriber station
+
|align = "center"|'''1 OR 2'''
|align = "center"|RedMAX™ Indoor Subscriber Unit (SU-I)
+
|align = "center"|'''82 unique (189 patents including families)'''
|align = "center"|&nbsp;
+
|  
[[Image:Document2_02.jpeg|125 px]]
+
 
+
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://www.airspan.com/products_wimax_hipermax.aspx Airspan]</u></font>
+
|}<br clear="all">
|align = "center"|Base station
+
|align = "center"|HiperMAX
+
|align = "center"|&nbsp;
+
[[Image:Document2_03.jpeg|125 px]]
+
  
|-
+
----
|align = "center"|<font color="#0000FF"><u>[http://images.google.co.in/imgres?imgurl=http://www.tech2.com/media/images/img_1809_samsung-sph-p9000-mobile-wimax_450x360.jpg&imgrefurl=http://www.tech2.com/india/news/smart-mobile-phones/samsung-unveils-wimaxready-p9000/2710/0&h=337&w=450&sz=89&hl=en&st Samsung]</u></font>
+
|align = "center"|WiMAX mobile phone
+
|align = "center"|Samsung SPH-P9000 Cellphone
+
|align = "center"|&nbsp;
+
[[Image:Document2_04.jpeg|125 px]]
+
  
|-
+
==IP Trend==
|align = "center"|<font color="#0000FF"><u>[http://www.navini.com/Website/Content/Products/Ripwave_MX_2.3GHz.htm Navini networks]</u></font>
+
*75 patents published in the last 10 years.
|align = "center"|Antenna system
+
*Patent filing is more in the last 4 years(75 %)
|align = "center"|Ripwave™ MX 2.3GHz
+
|align = "center"|&nbsp;
+
[[Image:Document2_05.jpeg|125 px]]
+
  
|-
+
[[Image:Year_wise_graph-Transactional_memory.jpg|align|thumb|center|500px|Year wise graph]]
|}
+
  
'''Sample analysis'''
+
----
* [[Media:wimax_upload.xls| Mobile WiMAX spreadsheet]]
+
  
'''Conferences'''
+
==Key companies==
* [http://usa.wimaxworld.com/ WiMAX world conference - 2008 in USA.]
+
* Intel(26 patents) and Sun Microsystems (19 patents) are major players.  
 +
* Microsoft(11 patents) and IBM(7 patents) are next to them.  
  
* [http://www.reghardware.co.uk/2007/09/18/idf_wimax_laptops/ Big-name vendors lined up to offer WiMAX laptops]
+
[[Image:Assignee_graph-Transactional_memory.jpg|align|thumb|center|500px|Top Assignees]]
  
* [http://www.dailywireless.org/2006/05/30/mobile-wimax-the-attack-plan/ Mobile WiMAX: The Attack Plan]
+
----
  
* [http://www.wimaxstrategies2007.com/ WiMAX Strategies 2007]
+
==Top IPC and US Classes==
 +
*'''Top IPC class:''' G06F
  
* [http://www.gsm-3gworldseries.com/newt/l/gsm/events/meg GSM>3G ME - The Leading Middle Eastern Communications Event - Dubai, UAE]
+
[[Image:IPC_class-Transactional_memory.jpg|align|thumb|center|500px|IPC class]]
  
* [http://www.wimax-vision.com/newt/l/wimaxvision/2007_events/world_forum WiMAX 2007]
+
*'''Top US class:''' 711, 707, 712, 717, 718
 +
[[Image:US_class-Transactional_memory.jpg|align|thumb|center|500px|US class]]
  
* [http://www.ispcon.com/fall2007.php ISPCON fall - 2007]
 
  
* [http://www.iptv-mea.com/ IPTV world forum - 2007 Middle East & Africa]
+
----
  
* [http://www.mobilenetx.com/index.shtml Mobile Internet World conference - 2007]
+
==Sample analysis==
 
+
{|border="2" cellspacing="0" cellpadding="4" width="100%"
* [http://www.parksassociates.com/events/europe/home.htm Strategies for digital living markets - 2007 (Connections - Europe )]
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">S.No.</font>
 
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">Patent/Publication No.</font>
* [http://www.iptv-asia.net/ IPTV Asia - 2007]
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">Title</font>
 
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">Transactional memory</font>
* [http://www.iptv-latinamerica.com/ IPTV World Forum Latin America 08]
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">Summary</font>
 
+
* [http://www.wcai.com/event/08/is14gen.htm WCA International Symposium & Business Expo]
+
 
+
* [http://www.iptv-forum.com/ IPTV World Forum 08]
+
 
+
* [http://www.wimax-vision.com/newt/l/wimaxvision/events/asia/ WiMAX Forum Congress Asia - 2008]
+
 
+
* [http://www.wimax-vision.com/newt/l/wimaxvision/events/europe WiMAX Forum Global Congress - 2008]
+
 
+
* [http://www.wimax-vision.com/newt/l/wimaxvision/events/usa WiMAX Forum Congress Americas - 2008]
+
 
+
* [http://www.wcai.com/event/08/08gen.htm WCA - 2008 Capitalizing on the 4G/WiMAX Eco-System]
+
 
+
* [http://www.meridianconferences.com/WBF2007_workshop_PF1.htm The Professionals Meridian Conferences]
+
 
+
* [http://www.ameinfo.com/71883.html 'Broadband & Beyond' conference highlights WiMAX technology]
+
 
+
* [http://www.edn-europe.com/amsterdamconferenceaddresseswimaxtrendsandissues+article+1641+Europe.html Amsterdam conference addresses WiMAX trends and issues]
+
 
+
* [http://www.iec.org/events/2007/bbwf/conference/b4.html WiMAX — Financial, Services, Technology Trends for Service Providers]
+
 
+
* [http://wimaxshowcase.tca.org.tw/ 2007 WiMAX Forum Taipei Conference]
+
 
+
* [http://www.at4wireless.com/wimax_plugfest 4th MOBILE WiMAX Forum PlugFest 4th MOBILE WiMAX Forum PlugFest]
+
 
+
* [http://sabb2007.tninternational.com/program.html The 1st South Asia Broadband Communications Congress & Expo]
+
 
+
* [http://www.tfci.com/cni/tema.htm India – Hub for Telecom Manufacturing & Exports]
+
 
+
* [http://www.assocham.org/ ASSOCHAM Frost & Sullivan International Conference on Broadband 2007]
+
 
+
* [http://www.communicasia.com/ CommunicAsia 2007]
+
 
+
* [http://europe.wimaxworld.com/ WiMAX World Europe 2007]
+
 
+
* [http://www.wimaxforum.org/home/ 3rd Mobile WiMAX Forum PlugFest]
+
 
+
* [http://www.convergenceindia.org/ 15th Convergence India 2007]
+
 
+
* [http://www.wimaxforum.org/home/ 2nd Mobile WiMAX Forum PlugFest]
+
 
+
* [http://www.indiatelecom.org/ India Telecom 2007]
+
 
+
* [http://www.meridianconferences.com/ WiMAX Focus]
+
 
+
 
+
'''WiMAX deals'''
+
 
+
* [http://www.australianit.news.com.au/story/0,24897,22490539-15321,00.html Intel wins Nokia mobile WiMAX deal]
+
 
+
* [http://www.usatoday.com/tech/wireless/2007-08-27-spring-samsung-new-york_N.htm Samsung, Sprint in WiMAX deal for NYC]
+
 
+
* [http://seekingalpha.com/article/41543-clearwire-sprint-near-WiMAX-deal-wsj Clearwire, Sprint Near WiMAX Deal -- WSJ]
+
 
+
* [http://telephonyonline.com/ctia/news/motorola_WiMAX_bts_032907/ CTIA: Moto wins ninth WiMAX deal; launches new BTS]
+
 
+
* [http://www.arnnet.com.au/index.php/id;505799818;fp;2;fpid;1 UK's picoChip wins WiMAX deal with China's ICT]
+
 
+
* [http://www.cbronline.com/article_news.asp?guid=B8A941BD-1F01-485C-9288-4F3DD5E88BC3 Motorola has secured two contracts to build WiMAX networks in Taipei, Taiwan.]
+
 
+
* [http://www.networksystemsdesignline.com/news/showArticle.jhtml?articleID=199701426 Intel mum on WiMAX deal in central China]
+
 
+
* [http://www.networkworld.com/news/2007/051807-nortel-toshiba.html Nortel, Toshiba in WiMAX deal]
+
 
+
* [http://www.redherring.com/Home/20590 Sprint, Nokia Ink WiMAX Deal]
+
 
+
* [http://www.ameinfo.com/130621.html Airspan, Umniah WiMAX deal]
+
+
* [http://www.zyxel.com/web/news_news.php?sqno=463 ZyXEL and Sprint sign deal for WiMAX customer premise equipment]
+
 
+
* [http://www.bbwexchange.com/pubs/2006/07/07/page1397-170032.asp Intel Makes Largest Investment Ever in WiMAX Deal with Clearwire and Motorola]
+
 
+
* [http://www.reuters.com/article/technology-media-telco-SP/idUSL0521971220070405 Pipex pens WiMAX deal with Nokia Siemens Networks]
+
 
+
* [http://www.wirelessweek.com/article.aspx?id=146753 Nortel Scores WiMAX Deal in U.S.]
+
 
+
* [http://search.japantimes.co.jp/cgi-bin/nb20070831a2.html DoCoMo, Acca ready WiMAX deal]
+
 
+
* [http://www.webmasterworld.com/forum10/11658.htm AOL and Clearwire Seal WiMAX Deal]
+
 
+
* [http://goliath.ecnext.com/coms2/gi_0199-5862948/Nera-wins-Africa-WiMAX-deal.html Nera wins Africa WiMAX deal.]
+
 
+
==WiBro==
+
WiBro is an acronym for wireless broadband and is actually a term that is in the process of being phased out in favor of the more collaborative and generic Mobile WiMAX.
+
* Korean standards makers early on adopted the term to describe their initiatives towards adopting a version of the 802.16e standard.
+
* Basically, the Korean standard chose to accept a specific mobile WiMAX iteration of 802.16e, rather than any future version that included backwards compatibility to fixed wireless 802.16 systems.
+
* Korea enjoys probably the most extensive 3G deployments in the world already, and its fixed broadband access per capita is the highest in the world. What it needed was an improved mobile broadband. In fact, the Korean government issued the first three deployment licenses for WiBro/Mobile WiMAX in January of 2005.
+
* WiBro/Mobile WiMAX in many respects is driving the mobile side of WiMAX at least from the point of view of vendors eager to provide products to these early deployments. This decision however, results in a backwards compatibility problem with Fixed WiMAX standards or 802.16-2004.
+
* The smooth interoperability of previous WiBro gear from Samsung with other vendors such as Motorola should be cemented this year as these two companies along with Intel have been chosen as the primary vendor for Sprint Nextel’s WiMAX deployment. The two companies clearly have a powerful incentive for their products to work seamlessly.
+
 
+
===Standards===
+
* WiBro is an integral part of IEEE 802.16e
+
 
+
===Companies===
+
* [[List of companies supporting WiBro technology]]
+
'''Industry news:'''
+
* South Korean telco SK Telecom and Wavesat, a Canadian developer of a WiMAX chipset, software and development platform have signed an agreement to cooperate in the development of WiBro/OFDMA technology for next generation mobile devices.
+
* Wavesat will work with SK Telecom (SKT) to develop WiBro/OFDMA systems-on-chips (SoCs), system tools and a development kit based on the WiBro 802.16e S-OFDMA profile. The U-mobile product portfolio from Wavesat will allow WiMAX wireless system providers (OEMs/ODMs) worldwide to develop and deploy fully mobile WiMAX and WiBro solutions.[http://www.digitalmediaasia.com/default.asp?ArticleID=12523 Source]
+
 
+
===Products Overview===
+
{|border="2" cellspacing="2" width="75%" align = "center"
+
|align = "center" bgcolor = "#99CCFF" rowspan = "2"|'''Company'''
+
|align = "center" bgcolor = "#99CCFF" colspan = "2"|'''Product'''
+
|align = "center" bgcolor = "#99CCFF" rowspan = "2"|'''Image'''
+
 
|-
 
|-
|align = "center" bgcolor = "#99CCFF"|'''Main category'''
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">1</font>
|align = "center" bgcolor = "#99CCFF"|'''Sub category'''
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220040015642%22.PGNR.&OS=DN/20040015642&RS=DN/20040015642 US20040015642A1]</u></font>
 +
|Software transactional memory for dynamically sizable shared data structures
 +
|align = "center"|Dynamic STM (DSTM)
 +
|A software transactional memory that allows concurrent non-blocking access to a dynamically sizable data structure defined in shared storage managed by the software transactional memory is described. The implementation is called dynamic software transactional memory (DSTM). DSTM techniques allow transactions and transactional objects to be created dynamically. The non-blocking property considered here is obstruction-freedom.
 
|-
 
|-
|align = "center" rowspan = "4"|Samsung
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">2</font>
|align = "center" rowspan = "3"|Mobile Station
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20060085591.PGNR.&OS=DN/20060085591&RS=DN/20060085591 US20060085591A1]</u></font>
|align = "center"|<font color="#0000FF"><u>[http://www.3g.co.uk/PR/Jan2006/2427.htm M8000 WiBro handset  ]</u></font>
+
|Hybrid hardware and software implementation of transactional memory access
|align = "center"|&nbsp;
+
|align = "center"|Phased Transactional Memory (PhTM)
[[Image:Document5_01.jpg|125 px]]
+
|The invention relates to a hybrid hardware and software implementation of transactional memory accesses in a computer system. A processor including a transactional cache and a regular cache is utilized in a computer system that includes a policy manager to select one of a first mode (a hardware mode) or a second mode (a software mode) to implement transactional memory accesses. In the hardware mode the transactional cache is utilized to perform read and write memory operations and in the software mode the regular cache is utilized to perform read and write memory operations.
 
+
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://uk.gizmodo.com/2005/12/28/samsungs_super_wibro_phone.html Super WiBro Phone ]</u></font>
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">3</font>
|align = "center"|&nbsp;
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20070028056.PGNR.&OS=DN/20070028056&RS=DN/20070028056 US20070028056A1]</u></font>
[[Image:Document5_02.jpg|125 px]]
+
|Direct-update software transactional memory
 
+
|align = "center"|Dynamic STM (DSTM)
 +
|A transactional memory programming interface allows a thread to directly and safely access one or more shared memory locations within a transaction while maintaining control structures to manage memory accesses to those same locations by one or more other concurrent threads. Each memory location accessed by the thread is associated with an enlistment record, and each thread maintains a transaction log of its memory accesses.
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://aving.net/usa/news/default.asp?mode=read&c_num=28705&c_code=02&sp_code=0&btb_num=2747 WiBro-enabled notebook pc]</u></font>
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">4</font>
|align = "center"|&nbsp;
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20070156780.PGNR.&OS=DN/20070156780&RS=DN/20070156780 US20070156780A1]</u></font>
[[Image:Document5_03.jpg|125 px]]
+
|Protecting shared variables in a software transactional memory system
 
+
|align = "center"|Dynamic STM (DSTM)
 +
|For a variable accessed at least once in a software-based transactional memory system (STM) defined (STM-defined) critical region of a program, modifying an access to the variable that occurs outside any STM-defined critical region system by starting a hardware based transactional memory based transaction, within the hardware based transactional memory based transaction, checking if the variable is currently owned by a STM transaction, If the variable is not currently owned by a STM transaction, performing the access and then committing the hardware based transactional memory transaction and if the variable is currently owned by a STM transaction, performing a responsive action.
 
|-
 
|-
|align = "center"|Access control Router
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">5</font>
|align = "center"|<font color="#0000FF"><u>[http://www.etopiamedia.net/ybw/pages/ybw2-5551212.html Access control Router]</u></font>
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20070156994.PGNR.&OS=DN/20070156994&RS=DN/20070156994 US20070156994A1]</u></font>
|align = "center"|&nbsp;
+
|Unbounded transactional memory systems
[[Image:Document5_04.jpg|125 px]]
+
|align = "center"|Unbounded Hardware Transactional Memory (UHTM)
 
+
|Methods and apparatus to provide unbounded transactional memory systems are described. Transactional memory is implemented through a table lookup mechanism. To access a shared resource, a thread may first check a table stored in memory to determine whether another thread is accessing the same portion of the shared resource. Accessing a table that is stored in memory may generate overhead that decreases performance.
 
|-
 
|-
|align = "center"|Kisan Telecom
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">6</font>
|align = "center"|Base station
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20070239942.PGNR.&OS=DN/20070239942&RS=DN/20070239942 US20070239942A1]</u></font>
|align = "center"|<font color="#0000FF"><u>[http://www.kisantel.co.kr/eng/products/sub02.asp WiBro Repeater]</u></font>
+
|Transactional memory virtualization
|align = "center"|&nbsp;
+
|align = "center"|Virtualized Transactional Memory (VTM)
[[Image:Document5_05.jpg|125 px]]
+
|Methods and apparatus to provide transactional memory execution in a virtualized mode are described. Data corresponding to a transactional memory access request is stored in a portion of a memory after an operation corresponding to the transactional memory access request causes an overflow and a stored value may be updated for an occurrence of the overflow.
 
+
 
|-
 
|-
|align = "center"|i-River
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">7</font>
|align = "center"|Mobile Station
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20070300238.PGNR.&OS=DN/20070300238&RS=DN/20070300238 US20070300238A1]</u></font>
|align = "center"|<font color="#0000FF"><u>[http://www.mobilecomms-technology.com/projects/kt-corp/kt-corp2.html G10 games console]</u></font>
+
|Adapting software programs to operate in software transactional memory environments
|align = "center"|&nbsp;
+
|align = "center"|Dynamic Software Transactional Memory 2.0 (DSTM2)
[[Image:Document5_06.jpg]]
+
|Software transactional memory is used in non-managed language environments and with legacy codes without requiring a software programmer to change the programming paradigm they are currently used to. STM adapter system automatically transforms all the binary code executed within that block to execute atomically. STM adapter system automatically transforms lock-based critical sections in existing binary code to atomic blocks,
 
+
 
|-
 
|-
|align = "center"|Korea Telekom
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">8</font>
|align = "center"|USB modem
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20080005504.PGNR.&OS=DN/20080005504&RS=DN/20080005504 US20080005504A1]</u></font>
|align = "center"|<font color="#0000FF"><u>[http://www.kt.co.kr/eng/New/pr_news_kt_view.jsp iPlug Premium ]</u></font>
+
|Global overflow method for virtualized transactional memory
|align = "center"|&nbsp;
+
|align = "center"|Virtualized Transactional Memory (VTM)
[[Image:Document5_07.jpg]]
+
|A method and apparatus for virtualizing and/or extending transactional memory is described. Transactions are executed using local shared transactional memory, such as a cache memory. Upon overflowing the shared transactional memory, the transactional memory is virtualized and/or extended into a higher-level memory, such as a system memory.
 
+
 
|-
 
|-
|}
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">9</font>
 
+
|align = "center"|<font color="#0000FF"><u>[http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20080098374.PGNR.&OS=DN/20080098374&RS=DN/20080098374 US20080098374A1]</u></font>
==3GPP Long Term Evolution==
+
|Method and apparatus for performing dynamic optimization for software transactional memory
3GPP LTE (Long Term Evolution) is the name given to a project within the Third Generation Partnership Project to improve the UMTS mobile phone standard to cope with future requirements.
+
|align = "center"|Dynamic STM (DSTM)
 
+
|The present invention relates to a method and apparatus for performing dynamic optimization for STM. An optimistically immutable field is determined in the transaction to write. The transaction optimization unit keeps track of the status of object and class fields in a transaction. The transaction optimization unit invalidates methods corresponding to an optimistically immutable field in response to determining that the field has been written to and is therefore not immutable.
* LTE focus is on Enhancement of the Universal Terrestrial Radio Access (UTRA) and Optimisation of the UTRAN architecture.
+
* Downlink based on OFDMA (OFDMA offers improved spectral efficiency, capacity, etc)
+
* Uplink based on SC-FDMA (single carrier) (SC-FDMA is technically similar to OFDMA but is better suited for uplink from hand-held devices- more considerations on battery power)
+
 
+
===Standards===
+
* Download rates of 100 Mbit/s, and upload rates of 50 Mbit/s for every 20 MHz of spectrum
+
* At least 200 active users in every 5 MHz cell. (ie 200 active phone calls)
+
* Sub-5ms latency for small IP packets
+
* Increased spectrum flexibility, with spectrum slices as small as 1.25 MHz (and as large as 20 MHz) supported (W-CDMA requires 5 MHz slices, leading to some problems with roll-outs of the technology in countries where 5 MHz is a commonly allocated amount of spectrum, and is frequently already in use with legacy standards such as 2G GSM and cdmaOne.) Limiting sizes to 5 MHz also limited the amount of bandwidth per handset
+
* Optimal cell size of 5 km, 30 km sizes with reasonable performance, and up to 100 km cell sizes supported with acceptable performance
+
* Co-existence with legacy standards (users can transparently start a call or transfer of data in an area using an LTE standard, and, should coverage be unavailable, continue the operation without any action on their part using GSM/GPRS or W-CDMA-based UMTS)
+
 
+
 
+
[[Image:3GPP LTE protocol stack.jpg|center|900 px|thumbnail| '''3GPP LTE protocol stack''']]
+
 
+
===Companies===
+
 
+
* [[List of companies supporting 3GPP technology]]
+
 
+
===Products===
+
{|border="2" cellspacing="2" cellpadding="4" width="75%" align = "center"
+
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Company'''
+
|align = "center" bgcolor = "#00CCFF" colspan = "2"|'''Products'''
+
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Image'''
+
 
|-
 
|-
|align = "center" bgcolor = "#00CCFF"|'''Main category'''
+
|align = "center" bgcolor = "#969696"|<font color="#00FFFF">10</font>
|align = "center" bgcolor = "#00CCFF"|'''Sub category'''
+
|align = "center"|<font color="#0000FF"><u>[http://www.wipo.int/pctdb/en/fetch.jsp?LANG=ENG&DBSELECT=PCT&SERVER_TYPE=19-10&SORT=41253138-KEY&TYPE_FIELD=256&IDB=0&IDOC=1629252&C=10&ELEMENT_SET=B&RESULT=1&TOTAL=1&START=1&DISP=25&FORM=SEP-0/HITNUM,B-ENG,DP,MC,AN,PA,ABSUM-ENG&SEARCH_IA=US2008050081&QUE WO2008088931A2]</u></font>
|-
+
|FACILITATING EFFICIENT TRANSACTIONAL MEMORY AND ATOMIC OPERATIONS VIA CACHE LINE MARKING
|align = "center"|<font color="#0000FF"><u>[http://www2.rohde-schwarz.com/en/products/test_and_measurement/product_categories/spectrum_analysis/top_class/FSQ.html Rohde & Schwarz]</u></font>
+
|align = "center"|Hardware-Accelerated STM (HASTM)-Conflict detection
|align = "center"|Signal Analyzer
+
|The system starts by executing a transaction for a thread, wherein executing the transaction involves placing load-marks on cache lines which are loaded during the transaction and placing store-marks on cache lines which are stored to during the transaction. Upon completing the transaction, the system releases the load-marks and the store-marks from the cache lines which were load-marked and store-marked during the transaction. Note that during the transaction, the load-marks and store-marks prevent interfering accesses from other threads to the cache lines.
|align = "center"|FSQ Signal Analyzer
+
|align = "center"|&nbsp;
+
[[Image:3GPP_LTE_01.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://bul.ece.ubc.ca/Behrouz Pourseyed_UBC_IEEE_PDF.pdf Sierra Wireless]</u></font>
+
|align = "center"|PC cards
+
|align = "center"|PC card
+
|align = "center"|&nbsp;
+
[[Image:3GPP_LTE_02.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.anritsu.co.uk/news/default.php?id=619 Anritsu Company]</u></font>
+
|align = "center" rowspan = "2"|Test Systems
+
|align = "center"|MX785201A test systems
+
|align = "center"|&nbsp;
+
[[Image:3GPP_LTE_03.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.anritsu.co.uk/news/default.php?id=619 Anritsu Company]</u></font>
+
|align = "center"|MD8480C signaling tester
+
|align = "center"|&nbsp;
+
[[Image:3GPP_LTE_04.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://images.google.co.in/imgres?imgurl=http://www.3g.co.uk/PR/April2004/Picocell.jpg&imgrefurl=http://www.3g.co.uk/PR/April2004/7001.htm&h=248&w=405&sz=34&hl=en&start=14&um=1&tbnid=lSbNTfdqb4fDhM:&tbnh=76&tbnw=124&prev=/images%3Fq%3D3GPP%2B%252B%2Bsyste Picochip]</u></font>
+
|align = "center"|Bse station
+
|align = "center"|Base station damo
+
|align = "center"|&nbsp;
+
[[Image:3GPP_LTE_05.jpeg|125 px]]
+
 
+
 
|-
 
|-
 
|}
 
|}
  
==HSOPA==
 
High Speed OFDM Packet Access (HSOPA) is a proposed part of 3GPP's Long Term Evolution (LTE) upgrade path for UMTS systems. HSOPA is also often referred to as Super 3G. If adopted, HSOPA succeeds HSDPA and HSUPA technologies specified in 3GPP releases 5 and 6. Unlike HSDPA or HSUPA, HSOPA is an entirely new air interface system, unrelated to and incompatible with W-CDMA.
 
Features of HSOPA
 
  
===Standards===
+
----
* Flexible bandwidth usage with 1.25 MHz to 20 MHz bandwidths. By comparison, W-CDMA uses fixed size 5 MHz chunks of spectrum.
+
* Increased spectral efficiency at 2-4 times more than in 3GPP release 6, peak transfer rates of 100 Mbit/s for downlink and 50 Mbit/s for uplink.
+
* Latency times of around 20 ms for round trip time from user terminal to RAN, approximately the same as a combined HSDPA/HSUPA system, but much better than "classic" W-CDMA.
+
  
'''Design'''
+
==Patent dashboard==
 +
'''[http://client.dolcera.com/dashboard/dashboard.html?workfile_id=388 Patent Categorization in Dashboard]'''
  
HSOPA uses Orthogonal Frequency Division Multiplexing (OFDM) and multiple-input multiple-output (MIMO) antenna technology to support up to 10 times as many users as W-CDMA based systems, with lower processing power required on each handset.[1]. Still in development, experimental performance is 37 Mbit/s in the downlink over a 5 MHz channel, close to the theoretical maximum of 40 Mbit/s.
+
==<span style="color:#C41E3A">Like this report?</span>==
 
+
<p align="center"> '''This is only a sample report with brief analysis''' <br>
===Companies===
+
'''Dolcera can provide a comprehensive report customized to your needs'''</p>
 
+
{|border="2" cellspacing="0" cellpadding="4" align="center" "
* [[List of companies supporting HSOPA technology]]
+
|style="background:lightgrey" align = "center" colspan = "3"|'''[mailto:info@dolcera.com <span style="color:#0047AB">Buy the customized report from Dolcera</span>]'''  
 
+
===Products===
+
 
+
{|border="2" cellspacing="2" cellpadding="4" width="75%" align = "center"
+
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Company'''
+
|align = "center" bgcolor = "#00CCFF" colspan = "2"|'''Products'''
+
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Image'''
+
 
|-
 
|-
|align = "center" bgcolor = "#00CCFF"|'''Main category'''
+
| align = "center"| [http://www.dolcera.com/website_prod/services/ip-patent-analytics-services Patent Analytics Services]
|align = "center" bgcolor = "#00CCFF"|'''Sub category'''
+
|align = "center"| [http://www.dolcera.com/website_prod/services/business-research-services Market Research Services]
 +
|align = "center"| [http://www.dolcera.com/website_prod/tools/patent-dashboard Purchase Patent Dashboard]
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://www.3g.co.uk/PR/Sept2006/3627.htm Orange]</u></font>
+
|align = "center"| [http://www.dolcera.com/website_prod/services/ip-patent-analytics-services/patent-search/patent-landscapes Patent Landscape Services]
|align = "center"|PC crad
+
|align = "center"| [http://www.dolcera.com/website_prod/research-processes Dolcera Processes]
|align = "center"|PC card
+
|align = "center"| [http://www.dolcera.com/website_prod/industries Industry Focus]
|align = "center"|&nbsp;
+
[[Image:HSOPA_01.jpeg|125 px]]
+
 
+
 
|-
 
|-
|align = "center"|<font color="#0000FF"><u>[http://www.3g.co.uk/PR/Sept2006/3613.htm Samsung]</u></font>
+
|align = "center"| [http://www.dolcera.com/website_prod/services/ip-patent-analytics-services/patent-search/patent-landscapes Patent Search Services]
|align = "center" rowspan = "2"|Mobile
+
|align = "center"| [http://www.dolcera.com/website_prod/services/ip-patent-analytics-services/alerts-and-updates Patent Alerting Services]
|align = "center"|SGH-Z620
+
|align = "center"| [http://www.dolcera.com/website_prod/tools Dolcera Tools]
|align = "center"|&nbsp;
+
[[Image:HSOPA_02.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.3g.co.uk/PR/Sept2007/5209.htm T - mobile]</u></font>
+
|align = "center"|MDA Vario III
+
|align = "center"|&nbsp;
+
[[Image:HSOPA_03.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.3g.co.uk/PR/Sept2006/3586.htm Sarian]</u></font>
+
|align = "center"|Router
+
|align = "center"|HR4110 HSDPA router
+
|align = "center"|&nbsp;
+
[[Image:HSOPA_04.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.3g.co.uk/PR/August2006/3458.htm Centro technologies]</u></font>
+
|align = "center"|RF HSDPA Test Cases
+
|align = "center"|MINT T1152-HSDPA
+
|align = "center"|&nbsp;
+
[[Image:HSOPA_05.jpeg|125 px]]
+
 
+
 
|-
 
|-
 
|}
 
|}
 
+
<br>
==3GPP2 Ultra Mobile Broadband==
+
UMB (Ultra Mobile Broadband) is the brand name for the project within 3GPP2 to improve the CDMA2000 mobile phone standard for next generation applications and requirements.The system employs OFDMA technology along with advanced antenna techniques to provide peak rates of up to 280 Mbit/s.
+
 
+
Goals for UMB:
+
* Improving system capacity
+
* Greatly increasing user data rates throughout the cell
+
* Lowering costs
+
* Enhancing existing services
+
* Making possible new applications, and
+
* Making use of new spectrum opportunities.
+
 
+
The technology will provide users with concurrent IP-based services in a full mobility environment. The UMB standardization is expected to be completed in mid 2007, with commercialization taking place around mid-2009.
+
 
+
===Standards===
+
* OFDMA-based air interface
+
* Frequency Division Duplex
+
* Scalable bandwidth between 1.25-20 MHz (OFDMA systems are especially well suited for wider bandwidths larger than 5 MHz)
+
* Supports mixed cell sizes, e.g., macro-cellular, micro-cellular & pico-cellular.
+
* IP network architecture
+
* Supports flat, centralized and mixed topologies
+
* Data speeds over 275 Mbit/s downstream and over 75 Mbit/s upstream [http://en.wikipedia.org/wiki/Ultra_Mobile_Broadband Source]
+
 
+
[http://www.3gpp2.org/Public_html/Misc/AboutHome.cfm More infromation]
+
 
+
'''Key features'''
+
*  Multiple radio and advanced antenna techniques
+
*# Sophisticated control and signaling mechanisms (minimized) combine the best aspects of CDMA, TDM, OFDM, and OFDMA into a single air interface
+
*# Multiple Input Multiple Output (MIMO) and Space Division Multiple Access (SDMA)
+
*# Improved interference management techniques
+
* Ultra-high mobile broadband peak data rates
+
*# Up to 280Mbps peak data rate on forward link
+
*# Up to 68Mbps peak data rate on reverse link
+
* Ultra-low network latency
+
*# An average of 16.8 msec (32-byte, RTT) end-to-end network latency
+
* Enhanced VoIP capacity and user experience
+
*# Up to 500 simultaneous VoIP users (10 MHz FDD allocations)
+
* Scalable IP-based flat or hierarchical architecture
+
*# Greater service deployment flexibility, improved performance, and lower cost of ownership
+
* Flexible spectrum allocations
+
*# Scalable, non-contiguous and dynamic channel (bandwidth) allocations
+
*# Support for bandwidth allocations of 1.25 MHz, 5 MHz, 10 MHz and 20 MHz
+
* Less power consumption
+
*# Improved battery life
+
 
+
[http://www.cdg.org/technology/3g_umb.asp Source]
+
 
+
===Companies===
+
* [[List of companies supporting 3GPP2 UMB technology ]]
+
 
+
===Products===
+
 
+
{|border="2" cellspacing="2" cellpadding="4" width="75%" align = "center"
+
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Company'''
+
|align = "center" bgcolor = "#00CCFF" colspan = "2"|'''Products'''
+
|align = "center" bgcolor = "#00CCFF" rowspan = "2"|'''Image'''
+
|-
+
|align = "center" bgcolor = "#00CCFF"|'''Main category'''
+
|align = "center" bgcolor = "#00CCFF"|'''Sub category'''
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://images.google.co.in/imgres?imgurl=http://www.mobilewhack.com/oqo02-thumb.JPG&imgrefurl=http://www.mobilewhack.com/portable_devices/ultra_mobile_pcs/%3Fstart%3D25&h=259&w=250&sz=10&hl=en&start=15&um=1&tbnid=iPw46oQ3TpV5tM:&tbnh=112&tbnw=108&prev=/im OQO Inc]</u></font>
+
|align = "center"|Ultra mobile PC
+
|align = "center"|OQO Model 2 ultra mobile
+
|align = "center"|&nbsp;
+
[[Image:3GPP2_UMB_01.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://images.google.co.in/imgres?imgurl=http://www.pcworld.idg.com.au/im.php/width/640/im/3637_7_3_Mobile_Mobile_Broadband_USB.jpg&imgrefurl=http://www.pcworld.idg.com.au/index.php/pid%3B3637%3Btaxid%3B2136213053%3Bpt%3B1&h=426&w=640&sz=11&hl=en&start=13 3 Mobile]</u></font>
+
|align = "center"|Broad band USB
+
|align = "center"|Mobile Broadband USB modem
+
|align = "center"|&nbsp;
+
[[Image:3GPP2_UMB_02.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.geekzone.co.nz/content.asp?contentid=6598 Sprint]</u></font>
+
|align = "center"|Mobile Broadband Card
+
|align = "center"|EV-DO card
+
|align = "center"|&nbsp;
+
[[Image:3GPP2_UMB_03.jpeg|125 px]]
+
 
+
|-
+
|align = "center"|<font color="#0000FF"><u>[http://www.caviumnetworks.com/newsevents_caviumnetworks_Qualcomm.html Qualcomm]</u></font>
+
|align = "center"|Base station
+
|align = "center"|Base station
+
|align = "center"|N/A
+
|-
+
|}
+
 
+
 
==Contact Dolcera==
 
==Contact Dolcera==
  

Revision as of 07:58, 4 May 2010

Background

Transactional memory

  • Transactional memory is a general and flexible way to allow programs to read and modify disparate primary memory locations atomically as a single operation, much as a database transaction can atomically modify many records on disk.
  • Transactional memory attempts to simplify parallel programming by allowing a group of load and store instructions to execute in an atomic way. Transactional memory is a concurrency control mechanism analogous to database transactions for controlling access to shared memory in concurrent computing. A transaction is a piece of code that executes a series of reads and writes to shared memory.
  • Transactional memory (TM) supports code sections that are executed atomically, i.e., so that they appear to be executed one at a time, with no interleaving between their steps. TM significantly reduces the difficulty of writing correct concurrent programs. A good TM implementation avoids synchronization between concurrently executed transactional sections unless they actually conflict. TM can significantly improve the performance and scalability of concurrent programs, as well as makes them easier to write, understand and maintain.
  • Transactional memory generally refers to a synchronization model that allows multiple threads to concurrently access a shared resource (such as a data structure stored in memory) without acquiring a lock as long as the accesses are non-conflicting, for example, as long as the accesses are directed to different portions of the shared resource.

More details


Transactional programming models

  • Transactional programming models can be supported in software using software-based transactional memory (STM), in hardware using hardware- based transactional memory (HTM), or in a combination of the two (Hybrid TM, or HyTM).
    • Software based Transactional memory (STM) can allow sequences of concurrent operations to be combined into atomic transactions, thereby reducing the complexity of both programming and verification. STM is a scheme for concurrent programming with multiple threads that uses transactions similar to those used in databases.
    • Hardware based Transactional memory (HTM) system requires no read or write barriers within the transaction code. The hardware manages data versions and tracks conflicts transparently.
    • Hybrid Transactional memory (HyTM) implements Transactional memory in software so that it can use best-effort Hardware Transactional memory (HTM) to boost performance but does not depend on HTM.


Software based Transactional memory

  • Software transactional memory (STM) is implemented in software. All speculative STM transactional data is stored in the system memory and indicated to be in a non-committed state. When the STM transaction commits, any data the transaction writes is indicated as committed and subsequently available to other threads and transactions. In certain STM systems, a flag may be set to indicate the data as committed and accessible and available in memory to other transactions.

DracoSTM

  • DracoSTM is a high performance lock-based C++ Software Transactional memory research library. DracoSTM uses only native object-oriented language semantics, increasing its intuitiveness for developers while maintaining high programmability via automatic handling of composition, locks and transaction termination.
  • DracoSTM is a lock-based STM system. At its core, DracoSTM uses one lock per thread to implement transactional reads and writes. This allows multiple transactions to simultaneously read and write without blocking other transactions’ progress.


Dynamic STM (DSTM)

  • Dynamic Software Transactional Memory (DSTM) is a low-level application programming interface (API) for syn-chronizing shared data without using locks.
  • DSTM supports dynamic-sized data structures. DSTM has non-blocking implementation. The non-blocking property is obstruction-freedom. Dynamic means that the set of locations accessed by the transaction is not known in advance and is determined during its execution.
  • DSTM techniques allow transactions and transactional objects to be created dynamically.Transactions may determine the sequence of objects to access based on the values observed in objects accessed earlier in the same transaction. DSTM is well suited to the implementation of dynamic-sized data structures such as lists and trees.

Dynamic Software Transactional Memory 2.0 (DSTM2)

  • DSTM2 is a Java-based software library that provides a flexible framework for implementing STM. DSTM2 significantly improves the programming interface of its predecessor DSTM. The code is provided in Java libraries and any Java programmer can use it easily. DSTM2 allows researchers to plug in their STM implementations and directly compare them with others.
  • The DSTM2 library assumes that multiple concurrent threads share data objects. The DSTM2 library provides a new kind of thread that can execute transactions, which access shared atomic objects. DSTM2 threads provide methods for creating new atomic classes and executing transactions.

Nonblocking Software Transactional Memory

  • Nonblocking STMs are obstruction free. Nonblocking Software Transactional Memory guarantees that, if a transaction is repeatedly retried and eventually encounters no interference from other transactions, then eventually the transaction commits successfully.
  • Nonblocking STM “steals” ownership of a memory location from another transaction, rather than waiting for the other transaction to explicitly release it. Accessing stolen locations is more complicated and expensive than accessing unstolen ones, but stealing is worthwhile in order to avoid waiting for another transaction that is delayed for a long time.

Like this report?

This is only a sample report with brief analysis
Dolcera can provide a comprehensive report customized to your needs

Buy the customized report from Dolcera
Patent Analytics Services Market Research Services Purchase Patent Dashboard
Patent Landscape Services Dolcera Processes Industry Focus
Patent Search Services Patent Alerting Services Dolcera Tools


Non-blocking conditions

Lock-free transactional memory
  • Lock-free transactional memory: A transactional memory implementation is lock-free if all its operations are lock-free and if some thread repeatedly attempts to commit transactions, then eventually some thread performs a successful commit.
  • Lock-freedom: An implementation of an operation is lock-free if after a finite number of steps of any execution of that operation, some operation execution completes (irrespective of the timing behavior of any concurrent operation executions).
Wait-free transactional memory
  • Wait-free transactional memory: A transactional memory implementation is wait-free if all its operations are wait-free and any thread that repeatedly attempts to commit transactions eventually performs a successful commit.
  • Wait-freedom: An implementation of an operation is wait-free if after a finite number of steps of any execution of that operation, that operation execution completes (irrespective of the timing behavior of any concurrent operation executions).
Obstruction-free transactional memory
  • Obstruction-free transactional memory: A transactional memory implementation is obstruction-free if all its operations are obstruction-free and if some thread repeatedly attempts to commit transactions, and runs in isolation after some point, then it eventually performs a successful commit.
  • Obstruction-freedom: An implementation of an operation is obstruction-free if every operation execution that executes in isolation after some point completes after a finite number of steps.

Hardware based Transactional memory

  • HTM comprises hardware transactions implemented entirely in processor hardware. For hardware transactions, data may be stored in hardware registers and cache, such that all cache actions are done atomically in hardware and data in the HTM is only written to the main memory upon committing the transaction. The HTM holds all the speculative writes without propagating to the main system memory, such as a Random Access Memory (RAM) device, until the transaction commits. If the hardware transaction aborts, then the cache lines holding the tentative writes in the HTM are discarded. HTM hardware transactions may utilize cache coherency protocols to detect and manage conflicts between HTM hardware transactions. The cache coherency protocols keep track of accesses within a hardware transaction. If two hardware transactions are accessing a same memory location, then the HTM aborts one transaction if there is a conflict, else the transaction's changes may be committed to the system memory.
  • HTM transactions usually require less overhead then STM transactions because HTM transactions occur entirely in hardware. HTM transactions may be limited to smaller transactions due to hardware limitations, whereas STM transactions can handle large and longer transactions. Source
  • The multi-core processor Rock supports Hardware Transactional Memory (HTM).
  • Rock’s HTM feature is an important but modest first step in integrating HTM support into a mainstream commercial multi-core processor.
  • Rock supports HTM with two new instructions, chkpt and commit, and a new checkpoint status (cps) register. A transaction is started by a chkpt instruction, and is terminated by either a commit instruction or the failure of the transaction. If a transaction fails, some indication of the cause of failure is stored in the cps register, and control is transferred to the PC-relative offset (fail pc) specified by the chkpt instruction.

Adaptive Transactional Memory Test Platform

  • The Adaptive Transactional Memory Test Platform (ATMTP) provides a first-order approximation of the success and failure characteristics of transactions on Rock. ATMTP will allow developers to test and tune their code for Rock.
  • ATMTP correctly models Rock’s HTM-related instructions, and fairly accurately reflects most of the circumstances that cause Rock transactions to fail. ATMTP provides a good platform for experimenting with HTM-based code that will behave similarly on Rock.

Unbounded Hardware Transactional Memory (UHTM)

  • UHTM is commited in-cache. When not possible, hardware “spills” transaction information into memory, allowing (essentially) unbounded transactions. UTM is more appealing for programmer, but is significantly more complicated. Unbounded means that there is no limit on the number of locations accessed by the transaction.

Best-effort Hardware Transactional Memory

  • Best-effort Hardware Transactional Memory transactions are committed in-cache and aborted if they don’t fit. Best-effort Hardware Transactional Memory has simple design.Best-effort Hardware Transactional Memory violates Principle of Least Astonishment. Programmer should not have to think about cache mapping, cache size, cache organization, etc.
  • Best-effort HTM does not guarantee to support transactions of any size and duration, and thus is free to simply abort transactions that exceed on-chip resources for HTM or encounter difficult events or situations.

Split Hardware Transaction (SpHT)

  • The Split Hardware Transaction (SpHT)uses minimal software support to combine multiple segments of an atomic block, each executed using a separate hardware transaction, into one atomic operation. The idea of segmenting transactions can be used for many purposes, including nesting, local retry, or Else, and user-level thread scheduling. SpHT overcomes the limited expressive power of best-effort HTM while imposing overheads dramatically lower than STM and preserving useful guarantees such as strong atomicity provided by the underlying HTM.

Virtualized Transactional Memory (VTM)

  • Virtualized TM (VTM) maintains atomicity and isolation even if a transaction is interrupted by a cache overflow or a system event. VTM maps the key bookkeeping data structures for transactional execution (read set, write set, write buffer or undo-log) to virtual memory, which is effectively unbounded and is unaffected by system interruptions. The hardware caches hold the working set of these data structures. VTM also suggested the use of hardware signatures to avoid redundant searches through structures in virtual memory.

Conflict detection

  • HTM systems rely on a computer’s cache hierarchy and the cache coherence protocol to implement conflict detection. Caches observe all reads and writes issued by a processor, can buffer a significant amount of data, and can be searched efficiently because of their associative organization. All HTMs modify the first-level caches, but the approach extends to higher-level caches, both private and shared.
  • Conflict detection occurs as other processors receive the coherence messages from the committing transaction. Hardware looks up the received block address in the local caches. If the block is in a cache and has its R or W bit set, there is a read-write or a write-write conflict between the committing and the local transaction. The hardware signals a software handler, which aborts the local transaction and potentially retries it after a backoff period.
  • Direct memory updates: For direct updates, the hardware transparently logs the original value in a memory block before its first modification by a transaction. If the transaction aborts, the log is used to undo any memory updates.
  • Early conflict detection : For early conflict detection, the hardware acquires exclusive access to the cache block on the first write and maintains it until the transaction commits.

Hybrid Transactional memory (HyTM)

  • The HyTM approach is to provide an STM implementation that does not depend on hardware support beyond what is widely available today, and also to provide the ability to execute transactions using whatever HTM support is available in such a way that the two types of transactions can coexist correctly.
  • The key idea to achieving correct interaction between software transactions and hardware transactions is to augment hardware transactions with additional code that ensures that the transaction does not commit if it conflicts with an ongoing software transaction.

Phased Transactional Memory (PhTM)

  • Phased Transactional Memory (PhTM)supports switching between different “phases”, each implemented by a different form of transactional memory support. PhTM allows to adapt between a variety of different transactional memory implementations.

Nonblocking Zero-Indirection Transactional Memory (NZTM)

Hardware-Accelerated STM (HASTM)

  • Hardware-Accelerated STM (HASTM) system proposes hardware support to reduce the overhead of STM instrumentation. The supplementary hardware allows software to build fast filters that could accelerate the common case of read set maintenance.
  • HASTM provides the STM with two capabilities through per-thread mark bits at the granularity of cache blocks.
  • Conflict detection: Software can check if a mark bit was previously set for a given block of memory and that no other thread wrote to the block since it was marked.
  • Validation: Software can query if potentially there were writes by other threads to any of the memory blocks that the thread marked.

Signature-Accelerated STM (SigTM)

  • Signature-Accelerated STM (SigTM)uses hardware signatures to encode the read set and write set for software transactions. A hardware Bloom filter outside of the caches computes the signatures.b Software instrumentation provides the filters with the addresses of the objects read or written within a transaction. To detect conflicts, hardware in the computer monitors coherence traffic for requests for exclusive accesses to a cache block, which indicates a memory update.
  • The hardware tests if the address in a request is potentially in a transaction’s read or write set by examining the transaction’s signatures. If so, the memory reference is a potential conflict and the STM can either abort a transaction or turn to software validation.


Search strategy

Search concepts

Transactional memory Atomic memory transactions Concurrency control Shared memory access
transactional memory atomic memory transactions concurrency control shared memory synchronization
transactional execution AND memory atomically memory accesses concurrent computing shared memory access
hybrid transactional memory
software transactional memory
hardware transactional memory


Search strings

Concepts Scope Search string No of hits
Transactional memory Search scope: US Granted US Applications EP-A EP-B WO JP DE-C,B DE-A DE-T DE-U GB-A FR-A;
Claims, Title or Abstract
Years: 1836-2008
(transactional ADJ memory) OR ((transactional ADJ execution) SAME memory) 167
Other Keywords (atomic*4 NEAR2 memory NEAR2 (transaction*1 OR access*2)) OR (((concurrency ADJ control) OR (concurrent ADJ computing)) WITH ((shared ADJ memory) AND (synchronization OR access*2))) 24
Final 1 OR 2 82 unique (189 patents including families)


IP Trend

  • 75 patents published in the last 10 years.
  • Patent filing is more in the last 4 years(75 %)
Year wise graph

Key companies

  • Intel(26 patents) and Sun Microsystems (19 patents) are major players.
  • Microsoft(11 patents) and IBM(7 patents) are next to them.
Top Assignees

Top IPC and US Classes

  • Top IPC class: G06F
IPC class
  • Top US class: 711, 707, 712, 717, 718
US class



Sample analysis

S.No. Patent/Publication No. Title Transactional memory Summary
1 US20040015642A1 Software transactional memory for dynamically sizable shared data structures Dynamic STM (DSTM) A software transactional memory that allows concurrent non-blocking access to a dynamically sizable data structure defined in shared storage managed by the software transactional memory is described. The implementation is called dynamic software transactional memory (DSTM). DSTM techniques allow transactions and transactional objects to be created dynamically. The non-blocking property considered here is obstruction-freedom.
2 US20060085591A1 Hybrid hardware and software implementation of transactional memory access Phased Transactional Memory (PhTM) The invention relates to a hybrid hardware and software implementation of transactional memory accesses in a computer system. A processor including a transactional cache and a regular cache is utilized in a computer system that includes a policy manager to select one of a first mode (a hardware mode) or a second mode (a software mode) to implement transactional memory accesses. In the hardware mode the transactional cache is utilized to perform read and write memory operations and in the software mode the regular cache is utilized to perform read and write memory operations.
3 US20070028056A1 Direct-update software transactional memory Dynamic STM (DSTM) A transactional memory programming interface allows a thread to directly and safely access one or more shared memory locations within a transaction while maintaining control structures to manage memory accesses to those same locations by one or more other concurrent threads. Each memory location accessed by the thread is associated with an enlistment record, and each thread maintains a transaction log of its memory accesses.
4 US20070156780A1 Protecting shared variables in a software transactional memory system Dynamic STM (DSTM) For a variable accessed at least once in a software-based transactional memory system (STM) defined (STM-defined) critical region of a program, modifying an access to the variable that occurs outside any STM-defined critical region system by starting a hardware based transactional memory based transaction, within the hardware based transactional memory based transaction, checking if the variable is currently owned by a STM transaction, If the variable is not currently owned by a STM transaction, performing the access and then committing the hardware based transactional memory transaction and if the variable is currently owned by a STM transaction, performing a responsive action.
5 US20070156994A1 Unbounded transactional memory systems Unbounded Hardware Transactional Memory (UHTM) Methods and apparatus to provide unbounded transactional memory systems are described. Transactional memory is implemented through a table lookup mechanism. To access a shared resource, a thread may first check a table stored in memory to determine whether another thread is accessing the same portion of the shared resource. Accessing a table that is stored in memory may generate overhead that decreases performance.
6 US20070239942A1 Transactional memory virtualization Virtualized Transactional Memory (VTM) Methods and apparatus to provide transactional memory execution in a virtualized mode are described. Data corresponding to a transactional memory access request is stored in a portion of a memory after an operation corresponding to the transactional memory access request causes an overflow and a stored value may be updated for an occurrence of the overflow.
7 US20070300238A1 Adapting software programs to operate in software transactional memory environments Dynamic Software Transactional Memory 2.0 (DSTM2) Software transactional memory is used in non-managed language environments and with legacy codes without requiring a software programmer to change the programming paradigm they are currently used to. STM adapter system automatically transforms all the binary code executed within that block to execute atomically. STM adapter system automatically transforms lock-based critical sections in existing binary code to atomic blocks,
8 US20080005504A1 Global overflow method for virtualized transactional memory Virtualized Transactional Memory (VTM) A method and apparatus for virtualizing and/or extending transactional memory is described. Transactions are executed using local shared transactional memory, such as a cache memory. Upon overflowing the shared transactional memory, the transactional memory is virtualized and/or extended into a higher-level memory, such as a system memory.
9 US20080098374A1 Method and apparatus for performing dynamic optimization for software transactional memory Dynamic STM (DSTM) The present invention relates to a method and apparatus for performing dynamic optimization for STM. An optimistically immutable field is determined in the transaction to write. The transaction optimization unit keeps track of the status of object and class fields in a transaction. The transaction optimization unit invalidates methods corresponding to an optimistically immutable field in response to determining that the field has been written to and is therefore not immutable.
10 WO2008088931A2 FACILITATING EFFICIENT TRANSACTIONAL MEMORY AND ATOMIC OPERATIONS VIA CACHE LINE MARKING Hardware-Accelerated STM (HASTM)-Conflict detection The system starts by executing a transaction for a thread, wherein executing the transaction involves placing load-marks on cache lines which are loaded during the transaction and placing store-marks on cache lines which are stored to during the transaction. Upon completing the transaction, the system releases the load-marks and the store-marks from the cache lines which were load-marked and store-marked during the transaction. Note that during the transaction, the load-marks and store-marks prevent interfering accesses from other threads to the cache lines.



Patent dashboard

Patent Categorization in Dashboard

Like this report?

This is only a sample report with brief analysis
Dolcera can provide a comprehensive report customized to your needs

Buy the customized report from Dolcera
Patent Analytics Services Market Research Services Purchase Patent Dashboard
Patent Landscape Services Dolcera Processes Industry Focus
Patent Search Services Patent Alerting Services Dolcera Tools


Contact Dolcera

Samir Raiyani
Email: info@dolcera.com
Phone: +1-650-269-7952