Device identifier selection

ABSTRACT

A method includes receiving an enumeration message via a host interface of a device that is operatively coupled to a host device and to one or more other devices. The method includes identifying the enumeration message as a command originated by the host device or as a response message from one of the other devices. In response to identifying the enumeration message as a command, an enumeration response message is sent to the host device. The enumeration response message indicates a distinctive device identifier value. The method also includes, in response to identifying the enumeration message as a response message from one of the other devices, reading from the response message an identifier value used by such other device and at least temporarily storing this identifier value at the device to enable the device to select the distinctive device identifier value.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application is a divisional application of and claimspriority from U.S. patent application Ser. No. 12/509,832 filed Jul. 27,2009, the contents of which are incorporated by reference herein intheir entirety.

FIELD OF THE DISCLOSURE

The present disclosure is generally related to selecting a deviceidentifier.

BACKGROUND

Non-volatile memory devices, such as universal serial bus (USB) flashmemory devices and removable memory cards, have allowed for increasedportability of data and software applications. Host devices, such ascameras or mobile phones, may include a memory device interface thatenables the host device to access one or more memory devices, such a USBflash memory device or a removable memory card. A host device mayperform an enumeration process to determine identifiers for each devicecoupled to the memory device interface.

A conventional enumeration process may include receiving a firstidentifier from a first memory device, receiving a second identifierfrom a second memory device, comparing the second identifier to thefirst identifier, and requesting a new identifier from the second memorydevice if the first and second identifiers are the same. Often, however,devices are configured by a device manufacturer to select a commoninitial identifier value and to increment a previously selectedidentifier value by a pre-set amount each time the host requests a newidentifier from the memory device. To illustrate, each device mayinitially select the identifier value “1,” followed by “2,” “3,” and soon until an unused identifier value is found. In this case, a fifthenumerated device would select four unusable identifier values prior toselecting an identifier value that does not duplicate identifiers of thepreviously enumerated devices. Enumerating two devices may require threesequential identifier transmissions from the device to the host,enumerating three devices may require six identifier transmissions, andenumerating five devices may require fifteen identifier transmissions.Hence, there is a need for a more efficient method of selecting a deviceidentifier at a memory device interface.

SUMMARY

Systems and methods to select a device identifier of one or more devicescoupled to a memory device interface of a host device are disclosed.Prior to selecting an identifier value, each device may receive anenumeration command from the host device or one or more responses fromother devices to one or more enumeration commands. Each device reads oneor more identifier values used by other devices when a response isreceived from another device. Upon receiving an enumeration command oroptionally another device's response to an enumeration command, a deviceselects an identifier value that is distinctive from the used identifiervalues that have been read by the device and/or that obey certain rules.As a result, each device can select a distinctive identifier value priorto transmitting a response to the host device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a first particular embodiment of a systemto select a device identifier value;

FIG. 2 is a block diagram of a second particular embodiment of a systemto select a device identifier value showing a first device response to afirst enumeration command in a ring topology;

FIG. 3 is a block diagram of the system of FIG. 2 showing a seconddevice response to a second enumeration command;

FIG. 4 is a block diagram of the system of FIG. 2 showing a third deviceresponse to a third enumeration command;

FIG. 5 is a block diagram of a third particular embodiment of a systemto select a device identifier value illustrating a first device responseto an enumeration command in a linear daisy chain topology;

FIG. 6 is a block diagram of a fourth particular embodiment of a systemto select a device identifier value illustrating a first device responseto a first enumeration command in a ring topology;

FIG. 7 is a block diagram of the system of FIG. 6 showing a seconddevice response to a second enumeration command;

FIG. 8 is a block diagram of the system of FIG. 6 showing a third deviceresponse to a third enumeration command;

FIG. 9 is a block diagram of a fifth particular embodiment of a systemto select a device identifier value illustrating a response to anenumeration command by a first device in a ring topology;

FIG. 10 is a block diagram of the system of FIG. 9 illustrating amodification of the response by a second device;

FIG. 11 is a block diagram of the system of FIG. 9 illustrating amodification of the response by a third device;

FIG. 12 is a block diagram of a sixth particular embodiment of a systemto select a device identifier value;

FIG. 13 is a flow diagram of a first particular embodiment of a methodof selecting an identifier value;

FIG. 14 is a flow diagram of a second particular embodiment of a methodof selecting an identifier value;

FIG. 15 is a block diagram of a seventh particular embodiment of asystem to select a device identifier value;

FIG. 16 is a block diagram of an eighth particular embodiment of asystem to select a device identifier value;

FIG. 17 is a block diagram of a ninth particular embodiment of a systemto select a device identifier value;

FIG. 18 is a block diagram of a tenth particular embodiment of a systemto select a device identifier value;

FIG. 19 is a flow diagram of a third particular embodiment of a methodof selecting an identifier value;

FIG. 20 is a flow diagram of a fourth particular embodiment of a methodof selecting an identifier value;

FIG. 21 is a flow diagram of a fifth particular embodiment of a methodof selecting an identifier value;

FIG. 22 is a flow diagram of a sixth particular embodiment of a methodof selecting an identifier value; and

FIG. 23 is a flow diagram of a seventh particular embodiment of a methodof selecting an identifier value.

DETAILED DESCRIPTION

FIG. 1 is a block diagram of a first particular embodiment of a systemto select a device identifier value. The system 100 includes a hostdevice 110 in communication with a memory device 120 via a memory devicenetwork 102. The host device 110 includes a memory device interface 112coupled to the memory device network 102. For example, the memory devicenetwork 102 may be a bus and the memory device interface 112 may includea host bus interface. The host device 110 is configured to sendmessages, such as commands, data, or any combination thereof, to thememory device 120 and receive messages such as responses, via the memorydevice network 102. The host device 110 may include an electronic devicesuch as a computer, a mobile phone, a personal digital assistant (PDA),a gaming device, a communication device, a multimedia player device, anyother device adapted to communicate with one or more memory devices, orany combination thereof.

The memory device 120 receives data indicating one or more usedidentifier values 104, such as identifier values provided by otherdevices (not shown) coupled to the memory device network 102 during anenumeration operation. In response to receiving a device identificationmessage, such as an enumeration message 114, the memory device 120 mayselect a distinctive device identifier value 124. The distinctive deviceidentifier value 124 is a value other than any of the one or more usedidentifier values 104. The memory device 120 selectively sends aresponse 126 indicating the selected distinctive device identifier value124 to the host device 110 via the memory device network 102. Forexample, the distinctive device identifier value 124 may be sent to thehost 110 in a response as a relative card address (RCA), also sometimesreferred to as a “Device ID.” By selecting the distinctive deviceidentifier value 124 to avoid the used identifier values 104, the deviceidentifier value 124 may be accepted by the host device 110 withoutrequiring additional identifier value selection by the memory device120.

The host device 110 is configured to communicate with devices coupled tothe memory card network 102 using an identifier value for each devicethat is distinct from the identifier values of the other devices. Thehost device 110 may perform an enumeration operation, such as during aninitialization period, to request and receive an identifier from eachdevice. The host 110 sends the enumeration message 114, such as anenumeration command or other initialization command, to prompt thememory device 120 to select a device identifier value and receives theselected distinctive device identifier value 124 via the response 126.

The memory device 120 may be a flash memory card, such as an enhancedSD™ or microSD™ card that is adapted to select the distinctive deviceidentifier value 124 as a value different from any of the one or moreused identifier values 104. (SD and microSD are trademarks of SD-3C,LLC.) The memory device 120 includes a host interface 122 to enablecommunication with the host device 110 via the memory device network102. The memory device 120 may also include a non-volatile memory (notshown), such as a flash memory array, that is accessible to the hostdevice 110 after the distinctive device identifier value 124 has beenselected and used by the host device 110 to address messages to thememory device 120.

The memory device 120 is configured to receive messages during aninitialization process and to identify one or more received enumerationmessages as an enumeration command originated by the host device 110 oras a response message, such as an enumeration message that includes thedata indicating zero, one, or more used identifier values 104 and thatis originated by one or more other devices (not shown) coupled to thehost device 110 via the memory device network 102. An enumerationmessage may be an enumeration command, an enumeration response, or anyother type of message related to an enumeration process or that containsenumeration related information. In response to identifying a receivedmessage as an enumeration command, the memory device 120 may selectivelysend the response 126 including the distinctive device identifier value124 to the host device 110. In response to identifying the enumerationmessage as a response message indicating the one or more used identifiervalues 104, the memory device 120 may read the one or more usedidentifier values 104 from the response message. The memory device 120may store, at least temporarily, the identifier values used by otherdevices coupled to the memory device interface 112 of the host device toenable selection of the distinctive device identifier value 124.

Because the memory device 120 selects the distinctive device identifiervalue 124 to avoid identifier values used by other devices, a deviceenumeration may be performed without duplicating any previously-selectedidentifier values or other non-allowed values. As a result, enumerationof a large number of memory devices coupled to the memory device network102 may be performed significantly faster than systems where the memorydevices rely on the host to determine whether a selected identifiervalue is distinct from another device's identifier value.

Although the memory device 120 is described as identifying theenumeration message 114 as an enumeration command or an enumerationresponse message, in other embodiments the memory device 120 may insteadrespond to the enumeration message based on an internal state of thememory device (e.g. whether the memory device has selected itsidentifier value or has not selected its identifier value) and thecontent of the received enumeration message 114. For example, if theenumeration message 114 includes one or more device identifiers in themessage content, the memory device 120 may treat the enumeration message114 as a response message from another device and may store the deviceidentifiers from the message and forward the message to a next device.If the enumeration message 114 includes an identifier of the host device110, the memory device 120 may treat the enumeration message 114 as amessage sent by another device and store any identifier values in theenumeration message 114. If the enumeration message 114 includes anidentifier of “broadcast,” such as an all-“1” value identifier, as anillustrative non-limiting example, the memory device 120 may generatethe distinctive device identifier value 124 and send the distinctivedevice identifier value 124 to the host 110 via another enumerationmessage.

Further, the memory device 120 may be operative to select thedistinctive device identifier value 124 in accordance with one or moreselection rules during an enumeration operation such as upon a systeminitialization or when the memory device 120 is connected to the memorydevice network 102 after an enumeration operation has completed. Forexample, during the enumeration operation the memory device 120 mayselect the distinctive device identifier value 124 based on one or moreselection rules that cause the memory device 120 to operate as describedwith respect to FIGS. 2-4, FIG. 5, FIGS. 6-8, FIGS. 9-11, or anycombination thereof. Selection rules are further described with respectto FIG. 12. As another example, when the memory device 120 is coupled tothe host device 110 after the enumeration process has been completed,the host device 110 may transmit the largest device identifier valuealready selected by another device. In response, the memory device 120may select the distinctive device identifier value 124 according toselection criteria to be a number larger than the largest deviceidentifier value provided by the host device 110.

FIG. 2 is a block diagram of a second particular embodiment of a system200 to select a device identifier value. The system 200 shows a firstdevice response to a first enumeration command and has a ring topology.The system 200 includes a host device 210 coupled to a representativefirst device (Device 1) 220, a representative second device (Device 2)240, and a representative third device (Device 3) 260, via a memorydevice network 202. Each device 220, 240, and 260 may be configured tostore data indicating one or more used identifier values retrieved fromresponses indicating device identifier value selections of other devicesand to select a distinctive identifier value (i.e. an identifier valueother than the used identifier values).

The host device 210 includes a storage element, such as a non-volatilememory, a random access memory (RAM), one or more registers, or othertangible storage that is configured to store data corresponding toselected identifier values, illustrated as a table of enumerated devices211. The host device 210 also includes a memory device interface 212 toenable communication with the devices 220, 240, and 260 via the memorydevice network 202. The memory device interface 212 has a transmittercircuit 216 to send messages to the devices 220, 240, and 260 and areceiver circuit 218 to receive messages from the devices 220, 240, and260. As an illustrative example, the host device 210 may correspond tothe host device 110 of FIG. 1.

The memory device network 202 may include one or more pairs of datalines to transmit data between devices. The memory device network 202has a ring topology and messages travel in a single direction along acommunication path 204 around the ring. The first device 220 has a firstposition on the communication path 204, the second device 240 has asecond position on the communication path 204, and the third device 260has a third position on the communication path 204. The sequential orderof the positions of the devices 220, 240, and 260 corresponds to asequential order that messages travel from device to device along thecommunication path 204. For example, a message sent by the host device210 to a destination device may include a device identifier value in themessage header to indicate the destination device. Each device 220, 240,and 260 that receives the message may examine the message header todetermine whether the device is the intended recipient. If the device isnot the intended recipient, the device forwards the message (or a copyof the message) to the next device on the communication path 204. Themessage may be a command that includes a destination identification(DID) field that indicates no specific destination, such as by having a“broadcast” value, in which case any device that is in a state that canaccept the command will accept the command as an addressed recipient.

The first device 220 includes a host interface 222 that has a receivercircuit 226 and a transmitter circuit 228. The receiver circuit 226 isconfigured to receive messages, such as commands and data, from aprevious device on the communication path 204, i.e. the host device 210,via the memory device network 202. The transmitter circuit 228 isconfigured to transmit messages, such as responses, to a next device onthe communication path 204, i.e. the second device 240 via the memorydevice network 202.

The first device 220 includes one or more storage elements, such as oneor more of a non-volatile memory, a random access memory (RAM), one ormore registers, or other tangible storage, or any combination thereof,that are configured to store data corresponding to used identifiervalues that have been selected by one or more devices. The storageelements are illustrated as a table 230 storing one or more usedidentifier values 231. The first device 220 also includes a deviceidentifier tangible storage to store a device identifier value 224 ofthe first device 220. The first device 220 may include one or morecontrollers, memory arrays, wireless transceivers, or any combinationthereof, as described with respect to FIG. 11 and FIGS. 15-18. As anillustrative example, the first device 220 may correspond to the memorydevice 122 of FIG. 1. To illustrate, the first device 220 may be a flashmemory card.

The first device 220 is configured to receive an enumeration message viathe host interface 222 and to identify the received enumeration messageas a command originated by the host device 210, such as a firstenumeration command (ENUM CMD 1) 214 sent by the host device 210, or asa response message originated by another device. For example, the firstdevice 220 may read header information of a received message anddetermine a message type based on a message type indicator included inthe header information that indicates whether the message is a commandor a response message. In response to identifying the enumerationmessage as the response message, the device 220 may be configured toread an identifier value from the response message and store, at leasttemporarily, the identifier value at the table 230 as used by anotherdevice coupled to the memory device interface 212 of the host device210. The first device 220 may be configured to accumulate multiple usedidentifier values at the table 230 that are received via one or moreresponse messages.

In response to identifying the enumeration message as a command, thefirst device 220 is configured to selectively initiate sending of anenumeration response message indicating the distinctive deviceidentifier value 224 to the host device 210. For example, upondetermining that the enumeration message is a command, the first device220 may select the distinctive device identifier value 224 to be a valueother than any identifier value indicated as used by any other devicecoupled to the memory device interface of the host device 210. Toillustrate, the first device 220 may be configured to perform acomputation that generates the distinctive device identifier value basedon each of the used identifier value(s) 231 at the table 230, such as byadding all stored used identifier value(s) 231 and adding one to theresulting sum.

Alternatively, or in addition, the first device 220 may be configured toselect or generate one or more trial identifier values and to compareeach trial identifier value to the used identifier value(s) 231 in thetable 230 until an identifier value is determined to be distinct fromeach of the used identifier value(s) 231. As used here, a “trialidentifier value” may be a value generated by a device to be tested fordistinctiveness based on each identifier value that is indicated asbeing used. The trial identifier value may be selected as thedistinctive device identifier value 224 when the trial identifier valueis determined to be distinctive or may be discarded when the trialidentifier value is found to duplicate a used identifier value. Forexample, each of the one or more trial identifier values may be comparedto each of the used identifier value(s) 231. The first device 220 maycontinue iteratively selecting and comparing trial values until a valueis determined to not match any of the used identifier value(s) 231. Asanother example, where the used identifier value(s) 231 are sorted, suchas in an ascending or descending order, a trial identifier value may becompared to some but not all of the used identifier value(s) 231 todetermine whether the trial identifier value duplicates any of the usedidentifier value(s) 231. Trial values may be generated randomly orpseudo-randomly, selected from one or more stored values provided by adevice manufacturer, generated by another mechanism, or any combinationthereof.

After selecting, computing, or otherwise generating an identifier value224 that is distinct from each of the one or more used identifier values231, the first device 220 stores the distinctive device identifier value224 and generates and sends an enumeration response message, such as aresponse 226, to the host. The response 226 indicates the distinctivedevice identifier value 224 and is transmitted to the next device on thecommunication path for eventual delivery to the host device 210 via oneor more other devices (e.g. the second device 240 and the third device260).

The enumeration message (e.g. the first command 214 and/or the response226) may optionally include error detection data that enables the hostdevice 210 to detect an occurrence of one or more errors that occur asthe response 226 is routed to the host device 210. For example, theerror detection data may include cyclic redundancy check (CRC) data 227.Alternatively, or in addition, the response 226 may include redundancydata, parity data, or any other error detection or error correctiondata.

The first device 220 may not respond to all received enumerationmessages identified as commands by selecting the distinctive deviceidentifier value 224 and sending a response. For example, a commandreceived at the first device 220 is forwarded without sending anenumeration response message in response to the first device 220determining that the command indicates one or more recipients but doesnot indicate the first device 220 as a recipient. To illustrate, thefirst device 220 may read header information of the command thatindicates one or more device identifier values but that does not matchthe distinctive device identifier value 224 of the first device 220. Inthis case, the first device 220 forwards the command to the seconddevice 240 without sending a response message to the host 210.

The second device 240 includes a host interface 242 that has a receivercircuit 246 and a transmitter circuit 248. The second device 240includes one or more storage elements, such as one or more of anon-volatile memory, a random access memory (RAM), one or moreregisters, or other tangible storage, or any combination thereof. Theone or more storage elements are configured to store data correspondingto identifier values that have been selected by a device, illustrated asa table 250 storing one or more used identifier values 251. The seconddevice 240 also includes a device identifier tangible storage to store adistinctive device identifier value 244 of the second device 240.

The third device 260 includes a host interface 262 that has a receivercircuit 266 and a transmitter circuit 268. The third device 260 includesone or more storage elements such as one or more of a non-volatilememory, a random access memory (RAM), one or more registers, or othertangible storage, or any combination thereof. The one or more storageelements are configured to store data corresponding to identifier valuesthat have been selected by a device, illustrated as a table 270 storingone or more used identifier values 271. The third device 260 alsoincludes a device identifier tangible storage to store a distinctivedevice identifier value 264 of the third device 260.

The second device 240, the third device 260, or any combination thereof,may include one or more controllers, memory arrays, wirelesstransceivers, or any combination thereof. The second device 240 and thethird device 260 may be configured to operate in a substantially similarmanner as the first device 220 during a device enumeration operation.

During operation, the host device 210 may send a first enumerationcommand (ENUM CMD 1) 214 over the communication path 204 and the firstenumeration command 214 is received by the first device 220. The firstenumeration command 214 may be sent as part of an enumeration operationthat the host device 210 initiates during an initialization process.Each device 220, 240, and 260 may be in an initialization state thatcauses the devices 220, 240, and 260 to be responsive to enumerationcommands and to other devices' responses to enumeration commands. Eachdevice 220, 240, and 260 may be initialized to have an empty table 230,250, 270 of used identifier values and no selected device identifiervalue 224, 244, 264. As an example, the host device 210 may initiate apower-up event to the devices 220, 240, and 260 by providing power viathe memory device network 202, and in response to detecting the power-upevent, each device 220, 240, and 260 may enter an initialization state.

The first device 220 may receive the first enumeration command 214 whilethe table 230 is empty, i.e. before any device has selected a deviceidentifier value. In response, the first device 220 may access the table230 and perform a computation to generate a distinctive deviceidentifier value of “2.” For example, the first device 220 may sum allused identifier value(s) 231 (e.g., the sum may be zero when the tableis empty) and add a constant to generate the result “2.” Alternatively,the first device 220 may generate or select a trial identifier value of“2.” For example, the first device 220 may generate a random identifiervalue, select an identifier value from a table, or use a pre-set initialidentifier value, as illustrative, non-limiting examples. The firstdevice 220 may compare the trial identifier value to the table 230,determine that the table 230 stores no used identifier values, andselect the trial identifier value as the distinctive device identifiervalue 224. The first device 220 may generate the response 226, indicatethe host device 210 as the intended recipient of the response 226, andsend the response 226 along the communication path 204 to the seconddevice 240. Prior to sending the response 226, the first device 220 mayoptionally perform a CRC operation on data included in the response 226and include resulting CRC data 227 to enable detection of one or moretransmission errors.

The second device 240 receives the first response 226 and reads thedevice identifier value 224 (“2”) from the response 226. The seconddevice 240 records the device identifier value 224 (“2”) to the table250 as a used indicator value 251 and forwards the response 226 to thethird device 260. The third device 260 similarly reads the response 226and records the device identifier value 224 (“2”) to the table 270 andforwards the reply 226 to the host device 210.

The host device 210 receives the response 226 and records the identifiervalue of “2” as corresponding to the first device 220. The first device220 may enter an initialization complete state upon sending the response226, for example, or may enter the initialization complete state uponreceiving a signal from the host device 210 that the identifier valuehas been accepted, as another example.

Referring to FIG. 3, after recording the identifier value of the firstdevice 220, the host device 210 sends a second enumeration command (ENUMCMD 2) 314. The first device 220, having entered the initializationcomplete state, may forward the second enumeration command 314 to thesecond device 240 without generating a response.

The second device 240 receives the second enumeration command 314 whilethe table 250 stores only the used identifier value “2” of the firstdevice 220 and in response to receiving the second enumeration command314 selects or generates a trial identifier value in a manner similar tothe first device 220. For example, the second device 240 may perform acomputation using the value “2” at the table 250 to generate adistinctive device identifier value of “7.” As another example, thesecond device 240 may select or generate a trial identifier value of “2”and may compare the trial identifier value to the table 250 anddetermine that the trial identifier value matches a used identifiervalue 251 (i.e., “2” is already selected by the first device 220). Thesecond device 240 may select or generate a next trial identifier valueof “7”and compare the value “7” to the used identifier value 251 (FIG.2) stored at the table 250. Upon determining that the trial identifiervalue of “7” is distinct from the used identifier value 251 (FIG. 1),the second device 240 selects the trial identifier value as the deviceidentifier value 244. After selecting the device identifier value 244 as“7”, the second device 240 may also add the value “7” to the table 250to update stored used identifier values 351. The value “7” may be addedto the table 250, for example, so that in case a second enumerationtrial is requested of the second device 240 by the host device 210, suchas via a command having a Destination ID of “2”, the second device 240can select another identifier value by including “7” as a usedidentifier value.

The second device 240 may generate a response 346, indicate the hostdevice 210 as the intended recipient of the response 346, and send theresponse 346 along the communication path 204 to the third device 260.Prior to sending the response 346, the second device 240 may generateCRC data 347 and include the CRC data 347 to the response 346.

The third device 260 receives the response 346 and reads the deviceidentifier value from the response 346. The third device 260 records thedevice identifier value (“7”) to the table 270 to store updated usedindicator values 371 and forwards the response 346 to the host device210. The host device 210 receives the response 346 and records theidentifier value of “7” as corresponding to the second device 240. Thesecond device 240 may enter an initialization complete state aftersending the response 346.

Referring to FIG. 4, after recording the identifier value of the seconddevice 240, the host device 210 sends a third enumeration command (ENUMCMD 3) 414. The first device 220 and the second device 240, havingentered the initialization complete state, may forward the thirdenumeration command 414 to the third device 260 without generating aresponse.

The third device 260 receives the third enumeration command 414 and inresponse selects or generates a distinctive identifier value in a mannersimilar to the first device 220 and the second device 240. For example,the third device 260 may determine that an identifier value of “5” isdistinct from the used identifier values 371 (FIG. 3), and select theidentifier value of “5” as the device identifier value 264. The thirddevice 260 may generate a response 466, indicate the host device 210 asthe intended recipient of the response 466, and send the response 466 tothe host device 210. Prior to sending the response 466, the third device260 may optionally generate and include CRC data 467 to enable detectionof transmission errors. The third device 260 may add the value “5” tothe table 270 to update stored used identifier values 471 either priorto or after sending the response 466.

The host device 210 receives the response 466 and records the identifiervalue of “5” as corresponding to the third device 260. The third device260 may enter an initialization complete state after sending theresponse 466. Upon determining that all connected devices have beenassigned distinct identifier values, the host device 210 may end theenumeration operation. For example, the host device 210 may send afourth enumeration message (not shown) and detect that the fourthenumeration message returns to the host device 210, indicating that alldevices are in the initialization complete state.

As a result, the enumeration operation is performed with each device220, 240, and 260 selecting its own distinctive identifier value 224,244, 264. The enumeration operation efficiently uses transmission cyclesensuring that every device 220, 240, 260 chooses an identifier valuethat is not already used, thus eliminating extra messaging from the hostdevice 210 instructing devices to re-select identifier values andmessaging from the devices to the host device with a next selectedidentifier value. As a result, the enumeration cycle can be performedefficiently for a large number of devices.

Although three representative devices 220, 240, and 260 are illustratedas coupled to the host device 210 via the memory device network 202, anynumber of such devices may be coupled to the host device 210 via thememory device network 202. Also, although the memory device network 202is schematically illustrated as multiple discrete lines connecting thehost device 210 and the devices 220, 240, and 260 for ease ofexplanation, various physical structures may be used to form the memorydevice network 202 having a ring topology for messaging in a singledirection. As one illustrative example, the memory device network 202may be implemented by a bus that is controlled to emulate a ringtopology.

In addition, although described with respect to a ring topology, inother embodiments the memory device network 202 may be implemented usingother topologies, such as a tree topology, a star topology, or a lineardaisy chain topology. The memory device network may be implemented inone or more other topologies with a communication path between the hostdevice and each device that enables each device to receive priordevices' identifier value selections and to select a distinctiveidentifier value other than the selected identifier values of the priordevices. An example of a system using a linear daisy chain topology isdescribed with respect to FIG. 5.

FIG. 5 is a block diagram of a third particular embodiment of a systemto select a device identifier value. The system 500 includes a hostdevice 510 having a table 511 of enumerated devices and a memory deviceinterface 512. The host device 510 is coupled to a first device 520, asecond device 540, and one or more additional devices via a memorydevice network.

The memory device network includes a communication path having a firstleg originating at the host device 510 and including the first device510 at a first position on the communication path, the second device 520at a second position, and continuing to a last device (not shown) at alast position on the communication path. The communication path alsoincludes a second leg originating at the last device and ending at thehost device 510. Messages travel from the host device 510 to the devices520, 540 along the first leg of the communication path and from thedevices 520, 540 to the host device 510 along the second leg of thecommunication path.

The host device 510 is configured to send messages, such as commands, tothe devices 520, 540 via a transmitter circuit 516 of the memory deviceinterface 510. The host device 510 is also configured to receivemessages from the devices 520, 540 via a receiver circuit 518 of thememory device interface 512. The host device 510 may operatesubstantially as described with respect to the host device 210 of FIGS.2-4.

The first device 520 includes a table 530 to store used indicatorvalue(s) 531 and generates or selects a distinctive device identifiervalue 524 that is stored at the first device 520. The first device 520includes a host interface 522 that enables the first device 520 tocommunicate with the host device 510 via the memory device interface 512of the host device 510. The host interface 522 includes a first receivercircuit coupled to receive messages from the transmitter circuit 516 ofthe memory device interface 512 and a first transmitter circuit coupledto send messages to the receiver circuit 518 of the memory deviceinterface 512. The host interface 522 also includes a second transmittercircuit coupled to send messages to the second device 540 and a secondreceiver circuit coupled to receive messages from the second device 540.

The first device 520 is configured to receive messages, such ascommands, from the host device 510 and to determine whether to generateand send a response to the host device 510 or to forward the message tothe second device 540. For example, when the first device 520 determinesthat the first device 520 is an allowed or designated recipient of themessage, the first device 520 may generate and send a response to thereceiver circuit 518 of the host device 510 and may optionally forwardthe message to the second device 540, such as when the message indicatesmultiple recipients. When the first device 520 is not an allowed ordesignated recipient of the message, such as when a message headerindicates one or more designated recipients but does not indicate thefirst device 520, the first device 520 may forward the message to thesecond device 540 without generating a response. The first device 520 isalso configured to forward messages received from the second device 540to the receiver circuit 518 of the host device 512.

The second device 540 includes a table 550 to store used indicatorvalue(s) 551 and selects or generates a distinctive device identifiervalue 544 that is stored at the second device 540. The second device 540includes a host interface 542 that enables the second device 540 tocommunicate with the host device 510 via messages forwarded by the firstdevice 520 to and from the memory device interface 512 of the hostdevice 510. The host interface 542 includes a first receiver circuitcoupled to receive messages from the second transmitter circuit of thehost interface 522 of the first device 520 and a first transmittercircuit coupled to send messages to the second receiver circuit of thehost interface 522 of the first device 520. The host interface 542 alsoincludes a second transmitter circuit coupled to send messages to a nextdevice on the first leg of the communication path and a second receivercircuit coupled to receive messages from the next device on the secondleg of the communication path.

During operation, the first device 520 responds to a first enumerationcommand (not shown) from the host device 510 by selecting thedistinctive device identifier value 524 of “2” and storing the value of“2” as a used identifier value 531 at the table 530. To enable otherdevices at later positions along the communication path, such as thesecond device 524, to receive an indication that the identifier value of“2” is used, the first device 520 sends a response to the firstenumeration command to the second device 540 instead of, or in additionto, sending the response directly to the host device 510.

The host device 510 sends a second enumeration command 514 via thetransmitter circuit 516 of the memory device interface 512. The firstdevice 520, having already selected the device identifier value 524,forwards the second enumeration command 514 to the second device 540.

The second device 540 receives the enumeration command 514 and inresponse selects or generates the distinctive device identifier value544 of “7” to be distinct from the used identifier value of “2” storedin the table 550. The second device 540 records the value of “7” to usedidentifier values 551 at the table 550. To enable other devices at laterpositions along the communication path to receive an indication that theidentifier value of “7” is used, the second device 540 sends a response546 indicating the used identifier value of “7” along the first leg ofthe communication path in a direction away from the host device 510. Ina particular embodiment, the second device 540 may also send theresponse 546 to the first device 520. In an alternative embodiment, thesecond device 540 may not send the response 546 to the host device 510and may instead wait until the response 546 is propagated along thefirst leg of the communication path, reaches the last device on thecommunication path, and returns via the second leg of the communicationpath to be forwarded by the second device 540 to the first device 520and by the first device 520 to the host device 510.

FIG. 6 is a block diagram of a fourth particular embodiment of a systemto select a device identifier value. The system 600 includes a hostdevice 610 coupled to a representative first device (Device 1) 620, arepresentative second device (Device 2) 640, and a representative thirddevice (Device 3) 660, via a memory device network 602. Each device 620,640, and 660 may be configured to store data indicating one or more usedidentifier values retrieved from responses indicating device identifiervalue selections of other devices and to select a distinctive identifiervalue (i.e. an identifier value other than the used identifier values).

The host device 610 includes a storage element, such as a non-volatilememory, a random access memory (RAM), one or more registers, or othertangible storage that is configured to store data corresponding toselected identifier values, illustrated as a table of enumerated devices611. The host device 610 also includes a memory device interface 612 toenable communication with the devices 620, 640, and 660 via the memorydevice network 602. As an illustrative example, the host device 610 maycorrespond to the host device 210 of FIGS. 2-4.

The memory device network 602 may include one or more pairs ofdifferential signaling lines to transmit data between devices. Thememory device network 602 has a ring topology and messages travel in asingle direction along a communication path 604 around the ring. Thefirst device 620 has a first position on the communication path 604, thesecond device 640 has a second position on the communication path 604,and the third device 660 has a third position on the communication path604. The sequential order of the positions of the devices 620, 640, and660 corresponds to a sequential order that messages travel from deviceto device along the communication path 604. For example, a message sentby the host device 610 to a destination device may include a deviceidentifier value in the message header to indicate the destinationdevice. Each device 620, 640, and 660 that receives the message mayexamine the message header to determine whether the device is theintended recipient. If the device is not the intended recipient, thedevice forwards the message (or a copy of the message) to the nextdevice on the communication path 604. As an illustrative example, thememory device network 602 may correspond to the memory device network202 of FIGS. 2-4.

The first device 620 includes a host interface 622 configured to receivemessages, such as commands and data, from a previous device on thecommunication path 604, i.e. the host device 610, via the memory devicenetwork 602 and to transmit messages, such as responses, to a nextdevice on the communication path 604, i.e. the second device 640 via thememory device network 602.

The first device 620 includes one or more storage elements, such as oneor more of a non-volatile memory, a random access memory (RAM), one ormore registers, or other tangible storage, or any combination thereof,that are configured to store data corresponding to threshold identifiervalue. The storage devices are illustrated as a used identifier valuestorage 630 storing a used identifier value as an identifier valuethreshold 631. The first device 620 also includes a device identifiertangible storage to store a device identifier value 624 of the firstdevice 620. The first device 620 may include one or more controllers,memory arrays, wireless transceivers, or any combination thereof, asdescribed with respect to FIG. 11 and FIG. 15-18. As an illustrativeexample, the first device 620 may correspond to the memory device 120 ofFIG. 1 or the first device 220 of FIGS. 2-4.

The first device 620 is configured to receive an enumeration message viathe host interface 622 and to identify the received enumeration messageas a command originated by the host device 610, such as a firstenumeration command (ENUM CMD 1) 614 sent by the host device 610, or asa response message. For example, the first device 620 may read headerinformation of a received message and determine a message type based ona message type indicator included in the header information thatindicates whether the message is a command or a response message. Inresponse to identifying the enumeration message as the response message,the device 620 may be configured to read an identifier value indicatedas used by another device from the response message and store, at leasttemporarily, the used identifier value at the used identifier valuestorage 630 as the identifier value threshold 631. As an example, thefirst device 620 may be configured to accumulate multiple usedidentifier values that are received via one or more response messages atthe used identifier value storage 630 and to use a most recently storedidentifier value as the identifier value threshold 631. As anotherexample, the first device 620 may be configured to replace a stored usedidentifier value at the used identifier value storage 630 with theidentifier value read from the response message.

In response to identifying the enumeration message as a command, thefirst device 620 is configured to selectively initiate sending of anenumeration response message indicating the distinctive deviceidentifier value 624 to the host device 610. For example, upondetermining that the enumeration message is a command, the first device620 may select the distinctive device identifier value 624 by adding anoffset value 637 to a most recently stored used identifier value (i.e.the identifier value threshold) at the used identifier value storage 630to generate a result that is greater than the most recently stored usedidentifier value. As another example, the first device 620 may selectthe distinctive device identifier value 624 by subtracting the offsetvalue 637 to a most recently stored used identifier value (i.e. theidentifier value threshold 631) at the used identifier value storage 630to generate a result that is less than the identifier value threshold631. The offset value 637 may be selected by the first device 620, suchas a randomly or pseudo-randomly generated number. Alternatively, theoffset value 637 may be determined by a device manufacturer, such asstored at the first device 620 to have a value of “1” or “2” asillustrative, non-limiting examples.

As another example, the first device 620 may be configured to use themost recently stored used identifier value (i.e. the identifier valuethreshold 631) at the used identifier value storage 630 as a thresholdvalue that defines a non-allowed identifier range of values 633 and anallowed identifier range of values 635 and may select the distinctivedevice identifier value 624 to be within the allowed identifier range ofvalues 635. To illustrate, the first device 620 may generate a random orpseudo-random value that corresponds to a value within the allowedidentifier range of values 635. As another illustrative example, thefirst device 620 may select a value from a table of selectable values(not shown) such that the selected value is the lowest value within thetable of selectable values and also within the allowed identifier rangeof values 635. As another illustrative example, the first device 620 mayperform a calculation to determine a value that is within the allowedidentifier range of values 635, such as by adding the offset value 637to a value in the non-allowed identifier range of values 633 to selectan identifier value within the allowed identifier range of values 635.

When each device in the enumeration process uses a most recentlyreceived used identifier value as a threshold to select or generate adevice identifier value, each device ensures that its selected deviceidentifier value is distinct from all other identifier values that areindicated as used. After selecting or generating the distinctive deviceidentifier value 624, the first device 620 is configured to generate andsend an enumeration response message, such as a response 626, to thehost. The response 626 indicates the distinctive device identifier value624 and is transmitted to the next device on the communication path foreventual delivery to the host device 610 via one or more other devices(e.g. the second device 640 and the third device 660). The response 626may optionally include error detection data that enables the host device610 to detect an occurrence of one or more errors that occur as theresponse 626 is routed to the host device 610, as described with respectto FIGS. 2-4.

The first device 620 may not respond to all received enumerationmessages identified as commands by selecting the distinctive deviceidentifier value 624 and sending a response. For example, a commandreceived at the first device 620 is forwarded without sending anenumeration response message in response to the first device 620determining that the command indicates one or more recipients but doesnot indicate the first device 620 as a recipient. To illustrate, thefirst device 620 may read header information of the command thatindicates one or more device identifier values but that does not matchthe distinctive device identifier value 624 of the first device 620. Inthis case, the first device 620 forwards the command to the seconddevice 640 without sending a response message to the host 610.

The second device 640 includes a host interface 642 and one or morestorage elements such as one or more of a non-volatile memory, a randomaccess memory (RAM), one or more registers, or other tangible storage,or any combination thereof, that is configured to store datacorresponding to identifier values that have been selected by a device.The storage elements are illustrated as a used identifier value storage650 storing one or more used identifier values as an identifier valuethreshold 651. The second device 640 may also store an offset value 657.The second device 640 may be configured to use the identifier valuethreshold 651 as a threshold value that defines a non-allowed identifierrange of values 653 and an allowed identifier range of values 655. Thesecond device 640 also includes a device identifier tangible storage tostore a distinctive device identifier value 644 of the second device640.

The third device 660 includes a host interface 662 and includes one ormore storage elements such as one or more of a non-volatile memory, arandom access memory (RAM), one or more registers, or other tangiblestorage, or any combination thereof, that is configured to store datacorresponding to identifier values that have been selected by a device.The storage elements are illustrated as a used identifier value storage670 storing one or more used identifier values as an identifier valuethreshold 671. The third device 660 may also store an offset value 677.The third device 660 may be configured to use the identifier valuethreshold 671 as a threshold value that defines a non-allowed identifierrange of values 673 and an allowed identifier range of values 675. Thethird device 660 also includes a device identifier tangible storage tostore a distinctive device identifier value 664 of the third device 660.

The second device 640, the third device 660, or any combination thereof,may include one or more controllers, memory arrays, wirelesstransceivers, or any combination thereof. The second device 640 and thethird device 660 may be configured to operate in a substantially similarmanner as the first device 620 during a device enumeration operation.

During operation, the host device 610 may send a first enumerationcommand (ENUM CMD 1) 614 over the communication path 604 and the firstenumeration command 614 is received by the first device 620. The firstenumeration command 614 may be sent as part of an enumeration operationthat the host device 610 initiates during an initialization process.Each device 620, 640, and 660 may be in an initialization state thatcauses the devices 620, 640, and 660 to be responsive to enumerationcommands and to other devices' responses to enumeration commands. Eachdevice 620, 640, and 660 may be initialized to have an empty usedidentifier value storage 630, 650, 670 and no selected device identifiervalue 624, 644, 664. As an example, the host device 610 may initiate apower-up event to the devices 620, 640, and 660 by providing power viathe memory device network 602, and in response to detecting the power-upevent, each device 620, 640, and 660 may enter an initialization state.

The first device 620 may receive the first enumeration command 614. Inresponse, the first device 620 may access the used identifier valuestorage 630 and perform a computation to generate a distinctive deviceidentifier value 624 of “2.” For example, the first device 620 may addthe offset value 627 of “2” to the identifier value threshold 631, whichmay be initialized to a “0” value to generate the result “2.”Alternatively, the first device 620 may use the identifier valuethreshold 631 to define an allowed identifier range of values select atrial identifier value of “2” from an allowed identifier range ofvalues. For example, the first device 620 may generate a randomidentifier value, select an identifier value from a table, or use apre-set initial identifier value, as illustrative, non-limitingexamples. The first device 620 may generate the response 626 indicatingthe distinctive device identifier value as “2” and indicating the hostdevice 610 as the intended recipient of the response 626 and may sendthe response 626 along the communication path 604 to the second device640. Prior to sending the response 626, the first device 620 mayoptionally perform a CRC operation on data included in the response 626and include the resulting CRC data in the response 626 to enabledetection of one or more transmission errors. The first device 620 mayupdate the identifier value threshold 631, the non-allowed identifierrange of values 633, and the allowed identifier range of values 635.

The second device 640 receives the first response 626 and reads thedevice identifier value 624 (“2”) from the response 626. The seconddevice 640 records the device identifier value 624 (“2”) to the usedidentifier value storage 650 as an identifier value threshold 651 andforwards the response 626 to the third device 660. The second device 640may use the identifier value threshold 651 to define the non-allowedidentifier range of values 653 and the allowed identifier range ofvalues 655. The third device 660 similarly reads the response 626 andrecords the device identifier value 624 (“2”) as the identifier valuethreshold 671, and forwards the reply 626 to the host device 610. Thethird device 660 may use the identifier value threshold 671 to define anupdated non-allowed identifier range of values 673 and an updatedallowed identifier range of values 675.

The host device 610 receives the response 626 and records the identifiervalue of “2” as corresponding to the first device 620. The first device620 may enter an initialization complete state upon sending the response626, as one example, or as another example the first device 620 mayenter the initialization complete state upon receiving a signal from thehost device 610 that the identifier value has been accepted.

Referring to FIG. 7, after recording the identifier value of the firstdevice 620, the host device 610 sends a second enumeration command (ENUMCMD 6) 714. The first device 620, having entered the initializationcomplete state, may forward the second enumeration command 714 to thesecond device 640 without generating a response.

The second device 640 receives the second enumeration command 714 and inresponse selects or generates a distinctive identifier value in a mannersimilar to the first device 620. For example, the second device 640 mayadd the offset value 657 to the identifier value threshold 651 togenerate a distinctive device identifier value of “5.” As anotherexample, the second device 640 may select or generate the value of “5”as within the allowed identifier range of values 655. The second device640 stores the value “5” the distinctive device identifier value 644.The second device 640 may use the identifier value threshold 751 todefine an updated non-allowed identifier range of values 753 and anupdated allowed identifier range of values 755.

The second device 640 may generate a response 746, indicate the hostdevice 610 as the intended recipient of the response 746, and send theresponse 746 along the communication path 604 to the third device 660.The second device 640 may also add the value “5” to the used identifiervalue storage 650 to update an identifier value threshold 751. Prior tosending the response 746, the second device 640 may generate and includeCRC data in the response 746.

The third device 660 receives the response 746 and reads the deviceidentifier value from the response 746. The third device 660 records thedevice identifier value 644 (“5”) to the used identifier value storage670 to store an updated indicator value threshold 771 and forwards theresponse 746 to the host device 610. The host device 610 receives theresponse 746 and records the identifier value of “5” as corresponding tothe second device 640. The second device 640 may enter an initializationcomplete state after sending the response 746.

Referring to FIG. 8, after recording the identifier value of the seconddevice 640, the host device 610 sends a third enumeration command (ENUMCMD 3) 814. The first device 620 and the second device 640, havingentered the initialization complete state, may forward the thirdenumeration command 814 to the third device 660 without generating aresponse.

The third device 660 receives the third enumeration command 814 and inresponse selects or generates a distinctive identifier value in a mannersimilar to the first device 620 and the second device 640. For example,the third device 660 may determine that an identifier value of “7” isdistinct from all identifier values indicated as used based on theidentifier value threshold 771, and select the identifier value of “7”as the device identifier value 664. The third device 660 may generate aresponse 866, indicate the host device 610 as the intended recipient ofthe response 866, and send the response 866 to host device 610. Prior tosending the response 866, the third device 660 may optionally generateand include CRC data to enable detection of error occurrence duringtransmission. The third device 660 may also add the value “7” to theused indicator value storage 670 as an updated identifier valuethreshold 871. The third device 660 may use the identifier valuethreshold 871 to define an updated non-allowed identifier range ofvalues 873 and an updated allowed identifier range of values 875.

The host device 610 receives the response 866 and records the identifiervalue of “7” as corresponding to the third device 660. The third device660 may enter an initialization complete state after sending theresponse 866. Upon determining that all connected devices have beenassigned distinctive identifier values, the host device 610 may end theenumeration operation. For example, the host device 610 may send afourth enumeration message (not shown) and detect that the fourthenumeration message returns to the host device 610, indicating that alldevices are in the initialization complete state.

As a result, the enumeration operation is performed with each device620, 640, and 660 selecting its own distinct identifier value 624, 644,664 using a most recently received used identifier value (if any) as athreshold value to ensure each device selects a distinctive deviceidentifier value. The enumeration operation efficiently usestransmission cycles by ensuring that each device 620, 640, 660 choosesan identifier value that is already used, thus eliminating extramessaging from the host device 610 instructing devices to re-selectidentifier values and messaging from the devices to the host device witha next selected identifier value. As a result, the enumeration cycle canbe performed efficiently for a large number of devices.

Although three representative devices 620, 640, and 660 are illustratedcoupled to the host device 610 via the memory device network 602, anynumber of devices may be coupled to the host device 610 via the memorydevice network 602. Also, although the memory device network 602 isschematically illustrated as multiple discrete lines connecting the hostdevice 610 and the devices 620, 640, and 660 for ease of explanation,various physical structures may be used to form the memory devicenetwork 602 having a ring topology for messaging in a single direction.As one illustrative example, the memory device network 602 may beimplemented by a bus that is controlled to emulate a ring topology.

In addition, although described with respect to a ring topology, inother embodiments the memory device network 602 may be implemented usingother topologies, such as a tree topology, a star topology, or a lineardaisy chain topology (similar to the system 500 of FIG. 5). Acommunication path between the host device and each device enables eachdevice to receive prior devices' identifier value selections and toselect a distinctive identifier value other than the selected identifiervalues of the prior devices.

FIG. 9 is a block diagram of a fifth particular embodiment of a systemto select a device identifier value. The system 900 includes a hostdevice 910 coupled to a representative first device (Device 1) 920, arepresentative second device (Device 2) 940, and a representative thirddevice (Device 3) 960, via a memory device network 902. Each device 920,940, and 960 may be configured to store data indicating one or more usedidentifier values retrieved from responses indicating device identifiervalue selections of other devices and to select a distinct identifiervalue (i.e. an identifier value other than the used identifier values).

The host device 910 includes a storage element, such as a non-volatilememory, a random access memory (RAM), one or more registers, or othertangible storage that is configured to store data corresponding toselected identifier values, illustrated as a table of enumerated devices911. The host device 910 also includes a memory device interface 912 toenable communication with the devices 920, 940, and 960 via the memorydevice network 902. As an illustrative example, the host device 910corresponds to the host device 210 of FIG. 2, the memory device network902 corresponds to the memory device network 202 of FIG. 2, and acommunication path 904 corresponds to the communication path 204 of FIG.2.

The first device 920 includes a host interface 922 and includes one ormore storage elements, such as one or more of a non-volatile memory, arandom access memory (RAM), one or more registers, or other tangiblestorage, or any combination thereof, that is configured to at leasttemporarily store data corresponding to used identifier values that havebeen selected by one or more devices. The storage elements areillustrated as a table 930 storing one or more used identifier values931. The first device 920 also includes a device identifier tangiblestorage to store a device identifier value 924 of the first device 920.The first device 920 may include one or more controllers, memory arrays,wireless transceivers, or any combination thereof, as described withrespect to FIG. 11 and FIGS. 15-18. As an illustrative example, thefirst device 920 may correspond to the memory device 220 of FIG. 2.

As described below, each of the devices 920, 940, and 960 may receivedata indicating all used identifiers in a single message. As a result,each device may read the used identifiers into one or more temporarybuffers or RAM to generate a distinctive identifier value withoutcontinuing to store the used identifier values after the device selectsits own distinctive identifier value. Tables 930, 950, and 970 areillustrated for ease of explanation and may not correspond to actualdata structures in the devices.

The first device 920 is configured to receive an enumeration message viathe host interface 922 and to identify the received enumeration messageas a command originated by the host device 910, such as a firstenumeration command (ENUM CMD 1) 914 sent by the host device 910, or asa response message. For example, the first device 920 may read headerinformation of a received message and determine a message type based ona message type indicator included in the header information thatindicates whether the message is a command or a response message. Inresponse to identifying the enumeration message as the response message,the device 920 may be configured to read one or more identifier valuesfrom the response message and may store, at least temporarily, the readidentifier value(s) at the table 930 as used by another device coupledto the memory device interface 912 of the host device 910. The firstdevice 920 may be configured to accumulate multiple used identifiervalues at the table 930 that are received via a single response message.

The first device 920 may be configured, upon identifying the enumerationmessage as the response message, to select a device identifier valuethat is distinctive from each used identifiers read from the responsemessage and to generate a second response message that includes eachused identifier value identified by the response message and that alsoincludes the distinctive device identifier value. The first device 920may select a distinctive identifier value using one or more of theidentifier value selection techniques described with respect to thefirst device 220 of FIG. 2. As described further below, the receivedresponse message may include a used identifier value of each device (ifany) that has a corresponding position on the communication path 904between the host device 910 and a position of the first device 920. Thefirst device 920 may be configured to generate the second responsemessage by adding the distinctive device identifier value to a firstunused field of a set of device identifier fields in the responsemessage. The first device 920 may forward the response message includingthe distinctive device identifier value along the communication path 904to the host device 910.

In response to identifying the enumeration message as a command, thefirst device 920 is configured to selectively initiate sending of anenumeration response message, such as a response 926, indicating thedistinctive device identifier value 924 to the host device 910. Theresponse 926 includes a set of device identifier fields and includes thedistinctive device identifier value in a first sequential field,indicating the first device's relative position along the communicationpath 904 (i.e., the first position to receive messaging from the host910). The set of device identifier fields may include at least as manyfields as a maximum allowed number of devices that can be coupled to thememory device interface 912. The first device 920 transmits the response926 to the next device on the communication path for eventual deliveryto the host device 910 via one or more other devices (e.g. the seconddevice 940 and the third device 960). The response 926 may optionallyinclude error detection data that enables the host device 910 to detectan occurrence of one or more errors that occur as the response 926 isrouted to the host device 910, such as CRC data (not shown).

The first device 920 may not respond to all received enumerationmessages identified as commands by selecting the distinctive deviceidentifier value 924 and sending a response. For example, a commandreceived at the first device 920 is forwarded without sending anenumeration response message in response to the first device 920determining that the command indicates one or more recipients but doesnot indicate the first device 920 as a recipient.

The second device 940 includes a host interface 942 and one or morestorage elements, such as one or more of a non-volatile memory, a randomaccess memory (RAM), one or more registers, or other tangible storage,or any combination thereof, that is configured to store datacorresponding to identifier values that have been selected by a device.The storage elements are illustrated as a table 950 storing one or moreused identifier values 951. The second device 940 also includes a deviceidentifier tangible storage to store a distinctive device identifiervalue 944 of the second device 940.

The third device 960 includes a host interface 962 and one or morestorage elements, such as one or more of a non-volatile memory, a randomaccess memory (RAM), one or more registers, or other tangible storage,or any combination thereof, that is configured to store datacorresponding to identifier values that have been selected by a device.The storage elements are illustrated as a table 970 storing one or moreused identifier values 971. The third device 960 also includes a deviceidentifier tangible storage to store a distinctive device identifiervalue 964 of the third device 960.

The second device 940, the third device 960, or any combination thereof,may include one or more controllers, memory arrays, wirelesstransceivers, or any combination thereof. The second device 940 and thethird device 960 may be configured to operate in a substantially similarmanner as the first device 920 during a device enumeration operation.

During operation, the host device 910 may send a first enumerationcommand (ENUM CMD 1) 914 over the communication path 904 and the firstenumeration command 914 is received by the first device 920. The firstenumeration command 914 may be sent as part of an enumeration operationthat the host device 910 initiates during an initialization process asdescribed with respect to FIGS. 2-4 and FIGS. 6-8.

The first device 920 may receive the first enumeration command 914. Inresponse, the first device 920 generate a device identifier value of “2”and store the generated identifier value as the distinctive deviceidentifier value 924. In addition, the first device 920 may optionallyupdate the table 930. The first device 920 may generate the response926, indicate the host device 910 as the intended recipient of theresponse 926, indicate the distinctive device identifier value 924 of“2” in a first sequential identifier field of the response 926, and sendthe response 926 along the communication path 904 to the second device940. Prior to sending the response 926, the first device 920 mayoptionally include error detection data such as CRC data to the response926.

Referring to FIG. 10, the second device 940 receives the response 926and reads the used identifier value 924 of “2” from the response. Thesecond device 940 may add the used identifier value 924 of “2” to thetable 950 and selects or generates a distinctive identifier value of “7”in a manner similar to the first device 920. The second device 940stores the generated identifier value as the distinctive deviceidentifier value 944. The second device 940 may update the table 950 toinclude updated used identifier values 1051. The second device 940generates a second response 1046 that includes the device identifiervalue 924 (“2”) of the first device 920 in the first sequentialidentifier field and the distinctive device identifier value 944 (“7”)in a first unused identifier field, i.e., the second sequentialidentifier field. The second device 940 may indicate the host device 910as the intended recipient of the second response 1046 and send theresponse 1046 along the communication path 904 to the third device 940.Prior to sending the response 1046, the second device 940 may includeerror detection data, such as CRC data, in the response 1046.

Referring to FIG. 11, the third device 960 receives the response 1046and reads the used identifier values of “2” and “7” from the response1046. The third device 960 may add the used identifier values of “2” and“7” to the table 970 and selects or generates a distinctive identifiervalue of “5” in a manner similar to the first device 920. The thirddevice 960 stores the generated identifier value of “5” as thedistinctive device identifier value 964 and may update the table 970 toinclude updated used identifier values 1171. The third device 960generates a third response 1166 that includes the device identifiervalue “2” of the first device 920 in the first sequential identifierfield, the device identifier value “7” of the second device 940 in thesecond sequential identifier field, and the distinctive deviceidentifier value 964 of “5” in a first unused identifier field, i.e.,the third sequential identifier field. The third device 960 may indicatethe host device 910 as the intended recipient of the response 1166 andsend the response 1166 along the communication path 904 to the hostdevice 910. Prior to sending the response 1166, the third device 960 mayinclude error detection data, such as CRC data, in the response 1166.

As a result, the enumeration operation is performed with the host device910 sending a single enumeration command. The first device 920 generatesthe response 926 and each other device on the communication path 904(e.g. the second device 940 and the third device 960) receives a singleresponse that indicates all identifier values used by devices havingearlier positions on the communication path 904. Each device selects itsown distinctive identifier value, adds the selected distinctiveidentifier value to the next unused identifier field, and forwards theresponse to a next device on the communication path 904. The enumerationoperation efficiently uses transmission cycles by ensuring that eachdevice 920, 940, 960 chooses an identifier value that is not alreadyused, thus eliminating extra messaging from the host device 910instructing devices to re-select identifier values and messaging fromthe devices to the host device with a next selected identifier value. Asa result, the enumeration cycle can be performed efficiently for a largenumber of devices, with the host device 910 sending a single command andreceiving a single response that includes a set of all selectedidentifier values, and the identifier values in the response are orderedaccording to each device's position along the communication path 904.

Although three representative devices 920, 940, and 960 are illustratedas coupled to the host device 910 via the memory device network 902, anynumber of devices may be coupled to the host device 910 via the memorydevice network 902. In addition, although described with respect to aring topology, in other embodiments the memory device network 902 may beimplemented using other topologies, such as a tree topology, a startopology, or a linear daisy chain topology. A communication path betweenthe host device and each device enables each device to receive priordevices' identifier value selections and to select a distinctiveidentifier value other than the selected identifier values of the priordevices.

Elements of the system 200 described with respect to FIGS. 2-4, thesystem 600 described with respect to FIGS. 6-9, the system 900 describedwith respect to FIGS. 9-11, or any combination thereof, may be combinedin a single system. For example, the devices 920, 940, and 960 of FIG. 9may further be configured to use a received used identifier value as athreshold value that defines an allowed identifier range of values andto select a distinctive device identifier value to be within the allowedidentifier range of values in a manner similar to the devices 620, 640,and 660 of FIG. 6, in addition to the selected device identifier beingdistinct from each used identifier value received in a response message.To illustrate, the host device 910 may receive the response 1166 andmake a determination to repeat the enumeration process. For example, thehost device 910 may also be coupled to second ring of devices (notshown) and an identifier value included in the response 1166 mayconflict with an identifier value from the second ring of devices. Thehost device 910 may generate a command to cause the devices 920, 940,and 960 to re-select distinctive identifier values. The host device mayinclude in the command an identifier value threshold based on identifiervalues of devices on the second ring, to ensure that each of the devices920, 940, and 960 selects an identifier value distinct from each otherand also distinct from identifier values of devices on the second ring.As another example, the host device 910 may include in the command alist of parameters indicating identifier values selected by otherdevices and may broadcast or address the command to one or more of thedevices 920, 940, and 960 to enable re-selection of device identifiersthat are globally distinctive (i.e. distinct from identifiers of alldevices coupled to the host device).

FIG. 12 is a block diagram of a sixth particular embodiment of a systemto select a device identifier value. The system 1200 includes a storagedevice 1220 having multiple interfaces coupled to a controller 1232. Thecontroller 1232 is coupled to a Random Access Memory (RAM) 1242, a ReadOnly Memory (ROM) 1250, and a flash storage 1252. The storage device1220 may correspond to the memory device 120 of FIG. 1, one or more ofthe devices 220, 240, and 260 of FIGS. 2-4, one or more of the devices520 and 540 of FIG. 5, one or more of the devices 620, 640, and 660 ofFIGS. 6-8, one or more of the devices 920, 940, and 960 of FIGS. 9-11,or any combination thereof.

As illustrated, the storage device 1220 may include any number “i” ofinterfaces. One or more of the interfaces may be unidirectional, such asinput only or output only, or bidirectional supporting input and outputmessaging. One or more of the multiple interfaces may be configured tooperate as a host interface 1222 and may include one or more dedicatedinput interfaces and one or more dedicated output interfaces that enablethe host interface 1222 to operate similarly to the transmitter circuitsand the receiver circuits of the host interface 222 of the first device220 of FIG. 2 and the transmitter circuits and receiver circuits thehost interface 522 of the first device 520 of FIG. 5.

The controller 1232 includes an enumeration message identifier 1244, adistinct identifier selector 1246, and an enumeration response generator1248. One or more of the enumeration message identifier 1244, thedistinct identifier selector 1246, and the enumeration responsegenerator 1248 may be implemented as program instructions executed atthe controller 1232, as firmware or as dedicated circuitry within thecontroller 1232, or any combination thereof.

The enumeration message identifier 1244 is configured to determinewhether an enumeration message received via the host interface 1222 is acommand or a response message. For example, the controller 1232 may beconfigured to receive an enumeration message via the host interface 1222and to provide at least a header portion of the enumeration message tothe enumeration message identifier 1244. The enumeration messageidentifier 1242 may locate a message type identifier within the headerportion and compare the located message type identifier with a commandtype indicator, a response type indicator, or both. For example, theenumeration message include a specified message type indicator at apredetermined location in the message header. The enumeration messageidentifier 1244 may generate an output indicating whether theenumeration message is a command or a response message.

The distinct identifier selector 1246 is configured to select adistinctive device identifier value according to one or more selectionrules. For example, the distinct identifier selector 1246 may operateaccording to a selection rule to generate a distinctive identifier valuein response to the enumeration message identifier 1244 determining thata received enumeration is a command (and not a response) by performing acomputation of used identifier values 1247 to generate a result thatdoes not duplicate any of the used identifier values 1247, as describedwith respect to the system 200 of FIGS. 2-4. To illustrate, the distinctidentifier selector 1246 may retrieve all used identifier values 1247(e.g. from the RAM 1242, the flash storage 1252, or other tangiblestorage of the storage device 1220), and add all retrieved identifiervalues 1247 to generate a sum value, and then add a “1” value to the sumvalue to generate a distinctive result value.

As another illustration, the distinct identifier selector 1246 mayselect an initial trial value, such as by random or pseudo-randomselection, by accessing a predetermined value, or by computing theinitial trial value as a function of one or more parameters, compare theinitial trial value to one or more of the used identifier values 1247,and select the trial value as the identifier value in response todetermining that the trial value does not match any of the usedidentifier values 1247. If the trial value duplicates a used identifiervalue, the distinct identifier selector 1246 may select a next trialvalue, such as by random or pseudo-random selection, by accessing apredetermined next value, or by computing the next trial value as afunction of one or more parameters (e.g. adding an offset to the initialtrial value). The distinct identifier selector 1246 may continueiteratively selecting and comparing trial values until a value isdetermined to not match any of the used identifier values 1247.

As another example, the distinct identifier selector 1246 may operateaccording to a selection rule to generate a distinctive identifier valuein response to the enumeration message identifier 1244 determining thata received enumeration is a command (and not a response) by using a mostrecently received used identifier value as a threshold value, asdescribed with respect to the system 600 of FIGS. 6-8. To illustrate,the distinct identifier selector 1246 may retrieve a most recently usedidentifier value from the used identifier values 1247. The most recentlyused identifier value may be retrieved from a dedicated threshold valuestorage maintained by the controller 1232 from a memory location thatmay store multiple used identifier values in an order of receipt at thestorage device 1220 or may indicate an association with one or moretimestamps to indicate a relative time of receipt of the storedidentifiers. The distinct identifier selector 1246 may add an offsetvalue to the most recently used identifier value as described withrespect to the first device 620 of FIG. 6, subtract an offset value fromthe most recently used identifier value as described with respect to thefirst device 620 of FIG. 6, or use the most recently received useddevice indicator value to define an allowable identifier range of valuesas described with respect to the first device 620 of FIG. 6. Forexample, in an embodiment where a maximum number of devices that can becoupled to a memory device interface of a host device is 16 such that aninitial allowed range of identifiers is 0 to 15, in response to a mostrecently received used identifier value of “4” the distinct identifierselector 1246 may define a non-allowed identifier range of values to be0 to 4 and an allowed identifier range of values to be 5 to 15.

As another example, the distinct identifier selector 1246 may operateaccording to a selection rule to generate a distinctive identifier valuein response to the enumeration message identifier 1244 determiningwhether a received enumeration is a command or a response, as describedwith respect to the system 900 of FIGS. 9-11. Generation of thedistinctive identifier value may be performed according to one or moreof the described techniques.

The controller 1232 may be configured to operate according to aparticular one or more of the selection rules. For example, thecontroller 1232 may be programmable to receive one or more additionalselection rules or replacement selection rules. Selection of aparticular selection rule may be controlled by logic at the controller1232 or in response to external instructions, such as an instructionfrom a host device.

The enumeration response generator 1248 is configured to receive theselected distinctive device identifier value from the distinctidentifier selector 1246 and to generate a response message thatindicates the distinctive device identifier value. For example, theenumeration response generator 1248 may write a type indicator to aresponse header indicating a response type message and may write adestination indicator to the response header indicating a host device asthe intended recipient. The enumeration response generator 1248 maywrite the distinctive device identifier value or data indicating thedistinctive device identifier value to a body portion of the message,such as at one or more predefined field locations of the message. Theenumeration response generator 1248 may perform a parity check orperform a CRC operation to generate error detection data and may add theerror detection data to a predetermined field location of the message.

The controller 1232 may further be configured to send a response messagegenerated by the enumeration response generator 1248 to a host devicevia one or more interfaces of the host interface 1222. Operation of thestorage device 1220 is further described with respect to FIGS. 13-14.

FIG. 13 is a flow diagram of a first embodiment of a method of selectingan identifier value that may be performed by the storage device 1220 ofFIG. 12. The method 1300 includes, at 1302, receiving an enumerationmessage via one of the interfaces. A determination is made whether theenumeration message is a command, such as an enumeration requestcommand, or a response, such as an enumeration response, at 1304. Forexample, the determination may be made by the enumeration messageidentifier 1244 of FIG. 12. The enumeration message may be part of amore generic initialization command that also takes care of enumeration.In response to the enumeration message being identified as a response,at 1304, one or more identifier values included in the response arestored, at 1306.

Optionally, such as when implemented in a system, such as the system 900of FIGS. 9-11, in response to the enumeration message being identifiedas the response, at 1304, processing continues with generating aproposed distinctive identifier value as a function of stored identifiervalues, at 1308 and sending a response including all of the storedidentifier values and the proposed distinctive identifier value over oneor more of the output interfaces, at 1310. For example, the distinctiveidentifier value may be generated by the distinct identifier selector1246 of FIG. 12 and the response may be generated by the enumerationresponse generator 1248 of FIG. 12.

In response to the enumeration message being identified as a command, at1304, a determination may be made as to whether the receiving device isan addressed recipient, at 1312. For example, when the receiving devicehas transitioned to an initialization complete state, or as anotherexample when the receiving device has already selected a deviceidentifier value, the receiving device may determine that the receivingdevice is not an addressed recipient of an enumeration message sent froma host. As another example, when the command indicates one or moremessage recipients but does not indicate the receiving device as arecipient, the receiving device may determine itself to not be anaddressed recipient. As other examples, when the command includes thereceiving device's distinctive identifier value or when the command isan enumeration command and the receiving device does not yet have adistinctive identifier value, the receiving device may operate as if thereceiving device is an addressed recipient.

In response to determining that the receiving device is not an addressedrecipient, at 1312, the command is retransmitted or forwarded over oneor more of the output interfaces, at 1314. In response to determiningthat the receiving device is an addressed recipient, at 1312, a proposeddistinctive identifier value is generated as a function of storedidentifier values and parameters (if any) included in the command, at1316. For example, any number of parameters may be included in thecommand, such as to indicate an identifier value threshold, to indicateother used identifier values, or to direct the receiving device to use aparticular selection rule as described with respect to FIG. 12, asillustrative, non-limiting examples. A response is sent including theproposed distinctive identifier value over one or more of the outputinterfaces, at 1318. The distinctive identifier value may be generatedby the distinct identifier selector 1246 of FIG. 12 and the response maybe generated by the enumeration response generator 1248 of FIG. 12.

FIG. 14 is a flow diagram of a second particular embodiment of a methodof selecting an identifier value that may be performed by the storagedevice 1220 of FIG. 12. The method 1400 includes receiving anenumeration related message via one of the interfaces, at 1402. Adetermination may be made whether the enumeration related message is acommand addressed to the receiving device, at 1404. In a particularexample, a message is determined to be addressed to a receiving devicewhen: (1) the device receives an enumeration message while the devicedoes not yet have its own identifier value, or (2) the device has itsidentifier value set and the received message specifically contains theidentifier value, or (3) the device has its identifier value set and thereceived message is a broadcast message and/or a multicast message. Forexample, the determination may be made by the enumeration messageidentifier 1244 of FIG. 12. When the enumeration related message isdetermined to not be a command addressed to the receiving device, at1404, all used device identifier values in the message are stored, at1406, and the message is optionally retransmitted via one or more outputinterfaces, at 1408.

When the enumeration related message is determined to be a commandaddressed to the receiving device, at 1404, a proposed distinctiveidentifier value is generated as a function of stored identifier valuesand parameters (if any) included in the message, at 1410. A response issent including the proposed identifier value via one or more of theoutput interfaces, at 1412. For example, the distinctive identifiervalue may be generated by the distinct identifier selector 1246 of FIG.12 and the response may be generated by the enumeration responsegenerator 1248 of FIG. 12.

FIG. 15 is a block diagram of a seventh particular embodiment of asystem to select a device identifier value. The system 1500 includes ahost device 1510 coupled to a data storage device 1520 via a memorydevice network 1502. The system 1500 may operate substantially asdescribed with respect to the system 100 of FIG. 1, the system 200 ofFIGS. 2-4, the system 500 of FIG. 5, the system 600 of FIGS. 6-8, thesystem 900 of FIGS. 9-11, or the system 1200 of FIG. 12.

The host device 1510 includes a controller 1516 coupled to a memorydevice interface 1512. The controller 1516 may be configured to performan enumeration operation to obtain a set of distinct identifier valuescorresponding to multiple devices coupled to the memory device interface1512. The representative data storage device 1520 represents one of themultiple devices. The enumeration operation may include sending a firstenumeration message 1514, such as an enumeration command, via the memorydevice interface 1512. The first enumeration message 1514 includes acommand indicator 1515 that may be embedded within a header 1516 portionof the enumeration message 1514. The enumeration operation may alsoinclude receiving distinctive device identifier values via one or moreenumeration response messages. A first distinctive identifier value maycorrespond to a first device of the multiple devices and a seconddistinctive identifier value may correspond to a second device of themultiple devices. Data indicating one or more used identifier values(e.g. including the first distinctive identifier value) is provided tothe second device prior to selection of the second distinctiveidentifier value. Each received distinctive identifier value enables thehost device 1510 to specifically identify the corresponding device as amessage recipient. For example, each received distinctive identifiervalue may enable the host device 1510 to access the corresponding deviceby using the distinctive identifier value to specify the correspondingdevice as a message recipient. The distinctive identifier values may bereceived via enumeration response messages as described with respect tothe response 126 of FIG. 1, the responses 226, 346, and 466 of FIGS.2-4, the response 546 of FIG. 5, the responses 626, 746, and 866 ofFIGS. 6-8, or the response 1166 of FIG. 11, as illustrative,non-limiting examples.

The data storage device 1520 is adapted to be operatively coupled to ahost device as well as one or more other devices and includes a hostinterface 1522 that is coupled to the memory device interface 1512 ofthe host device 1510 via the memory device network 1502. A controller1532 is coupled to the host interface 1522 and coupled to a non-volatilememory 1534. The host interface 1522 may correspond to the hostinterface 222 of FIG. 2, the host interface 522 of FIG. 5, the hostinterface 622 of FIG. 6, the host interface 922 of FIG. 9, or the hostinterface 1222 of FIG. 12, as illustrative, non-limiting examples. Thenon-volatile memory 1534 may be a flash memory array, as an illustrativeexample.

The controller 1532 includes a processor 1538, one or more registers1540, and a random access memory (RAM) 1542. The controller 1532 alsoincludes an enumeration message identifier 1544, a distinct deviceidentifier selector 1546, and an enumeration response generator 1548.The RAM 1542 includes a used identifier value storage 1530 configured tostore one or more used identifier values 1531. The RAM 1542 may alsoinclude a device identifier value 1522 and software or other computerreadable instructions 1536 that are executable by the hardware processor1538 to execute one or more algorithms to enable the controller toselect a distinctive device identifier value 1522 different from anyidentifier value that any of the other devices have indicated as beingused (e.g. the distinctive device identifier value 1522 is a value otherthan any identifier value indicated as used by any other device coupledto the memory device interface 1512 of the host device 1510).

The controller 1532 is configured to receive an enumeration message viathe host interface 1522 and to identify the received enumeration messageas a command originated by the host device 1510 or as a response messagefrom one of the other devices. The controller 1532 is configured toprovide the received enumeration message to the enumeration messageidentifier 1544. The enumeration message identifier 1544 generates anoutput indicating whether the enumeration message is a command or aresponse message according to any one or more of the techniquesdescribed with respect to the enumeration message identifier 1244 ofFIG. 12. The enumeration message identifier 1544 may be an applicationrun by the processor 1538 by executing at least a portion of theexecutable instructions 1536, dedicated circuitry, firmware, or anycombination thereof.

The controller 1532 is configured to, in response to identifying thereceived enumeration message as a command, selectively initiate sendingan enumeration response message to the host device 1510, the enumerationresponse message indicating the distinctive device identifier value1522. The controller 1532 is configured to provide the output of theenumeration message identifier 1544 to the distinct device indicatorselector 1546. The distinct device indicator selector 1546 accesses theused identifier values 1531 and generates an output indicating thedistinct device indicator value 1522 according to any one or more of thetechniques described with respect to the distinct device indicatorselector 1246 of FIG. 12. The distinct device indicator selector 1546may be an application run by the processor 1538 by executing at least aportion of the executable instructions 1536, dedicated circuitry,firmware, or any combination thereof.

The controller 1532 is configured to provide the output of the distinctdevice indicator selector 1546 indicating the distinctive deviceindicator value 1522 to the enumeration response generator 1548. Theenumeration response generator 1548 generates a response that includesthe distinctive device identifier value according to any one or more ofthe techniques described with respect to the enumeration responsegenerator 1248 of FIG. 12. The enumeration response generator 1548 maybe an application run by the processor 1538 by executing at least aportion of the executable instructions 1536, dedicated circuitry,firmware, or any combination thereof.

The controller 1532 is configured to, in response to identifying theenumeration message as a response message from one of the other devices,read an identifier value used by such other device (e.g. an identifiervalue used by the device originating the received response) from theresponse message and store, at least temporarily, the identifier valueto enable the device 1520 to select its distinctive device identifiervalue 1522. For example the controller 1532 is configured to store anidentifier value read from a response message as a used identifier value1531 at the used identifier value storage 1530 at the RAM 1542.

During operation, the controller 1532 operates to enable the datastorage device 1520 to function in accordance with the operationsdescribed with respect to any one or more of the embodiments of FIGS.1-14. For example, the controller 1532 may cause the data storage device1520 to operate substantially as described with respect to the devices220, 240, and 260 of FIG. 2. As another example, the controller 1532 maycause the data storage device 1520 to operate substantially as describedwith respect to the devices 520, 540 of FIG. 5. As another example, thecontroller 1532 may cause the data storage device 1520 to operatesubstantially as described with respect to the devices 620, 640, and 660of FIG. 6. As another example, the controller 1532 may cause the datastorage device 1520 to operate substantially as described with respectto the devices 920, 940, and 960 of FIG. 9. After an enumeration processis over, or the data storage device 1520 enters an initializationcomplete state, or the distinct device identifier value 1522 istransmitted to the host device 1510, or any combination thereof, thecontroller 1532 is responsive to memory access requests that include thedistinctive device identifier value 1522 to provide access to thenon-volatile memory 1534. After selecting the distinctive deviceidentifier value, the data storage device 1520 may forward anenumeration command to a next device without generating a responsemessage in response to the enumeration command not specificallyidentifying any recipients (e.g. where the enumeration command is abroadcast enumeration command).

Although the processor 1538 is illustrated as a single processor, inother embodiments the processor 1538 may include multiple generalpurpose or special purpose processors, such as one or more digitalsignal processors (DSPs). In addition, although the RAM 1542 and the oneor more registers 1540 are illustrated as embedded with the controller1532, in other embodiments the RAM 1542, the one or more registers 1540,or any combination thereof, may be separate from the controller 1532 butaccessible to the controller 1532.

FIG. 16 is a block diagram of an eighth particular embodiment of asystem to select a device identifier value. The system 1600 includes thehost device 1510 and the memory device network 1502 described withrespect to FIG. 15.

A data storage device 1620 includes the host interface 1522, thecontroller 1532 coupled to the host interface 1522, and the non-volatilememory 1534, as described with respect to FIG. 15. The controller 1532includes the processor 1538, the one or more registers 1540, and the RAM1542. The controller 1532 also includes the enumeration messageidentifier 1544, the distinct device identifier selector 1546, and theenumeration response generator 1548. The RAM 1542 includes the deviceidentifier value 1522 and the software or other computer readableinstructions 1536.

As illustrated, a used identifier value storage 1630 is located at theone or more registers 1540 and configured to store the one or more usedidentifier values 1531. For example, the used identifier value storage1630 may include one or more dedicated registers sized to store a numberof identifiers up to a largest number of devices that can be coupled tothe memory device interface 1512 of the host device 1510. As anotherexample, the used identifier value storage 1630 may operate as atemporary storage, such as to temporarily store one or more of theidentifier values read from a response to perform an arithmeticoperation to compute the distinctive device identifier value 1546, andto write the stored identifier values 1531 and the distinctive deviceidentifier value 1546 to a response message.

FIG. 17 is a block diagram of a ninth particular embodiment of a systemto select a device identifier value. The system 1700 includes the hostdevice 1510 and the memory device network 1502 described with respect toFIG. 15.

A data storage device 1720 includes the host interface 1522, thecontroller 1532 coupled to the host interface 1522, and the non-volatilememory 1534, as described with respect to FIG. 15. The controller 1532includes the processor 1538, the one or more registers 1540, and the RAM1542. The controller 1532 also includes the enumeration messageidentifier 1544, the distinct device identifier selector 1546, and theenumeration response generator 1548. The RAM 1542 includes the deviceidentifier value 1522 and the software or other computer readableinstructions 1536. As illustrated, a used identifier value storage 1730is located at non-volatile memory 1534 and configured to store the oneor more used identifier values 1531.

FIG. 18 is a block diagram of a tenth particular embodiment of a systemto select a device identifier value. The system 1800 includes the hostdevice 1510 and the memory device network 1502 described with respect toFIG. 15.

A wireless communication device 1820 includes the host interface 1522coupled to the controller 1532. The wireless communication device 1820also includes a wireless transceiver 1846 coupled to the controller1532.

The controller 1532 includes the processor 1538, the enumeration messageidentifier 1544, the distinct device identifier selector 1546, and theenumeration response generator 1548. The controller 1532 is configuredto provide transmission content 1808 received from the host device 1510via the host interface 1522 to the wireless transceiver 1846. Forexample, the wireless transceiver 1846 may enable the wirelesscommunication device 1846 to wireless communicate via a wirelessprotocol such as frequency-hopping spread spectrum radio ad-hoc networkcommunication protocol (e.g. Bluetooth) or an Institute of Electricaland Electronics Engineers (IEEE) 802.11 protocol (e.g. Wi-Fi).

Referring to FIG. 19, a method of selecting an identifier value at adevice is illustrated. The device includes a host interface and thedevice is operatively coupled via the host interface to a host device aswell as one or more other devices. An example of a host device is amemory card or a wireless communication device adapted to communicatewith the host device via a memory device interface of the host device.The device is operative to select a distinctive device identifier valuethat is different from any identifier value that any of the otherdevices have indicated as being used. For example, if the device is thedevice 260 of FIG. 2, then the device selects a distinctive deviceidentifier value other than a device identifier value selected as usedby any of the devices 220 and 240 of FIG. 2.

In a particular embodiment, the method includes receiving an enumerationmessage at the device via the host interface, at 1902, and identifyingthe enumeration message as a command originated by the host device or asa response message from one of the other devices, at 1904. At decisionstep 1906, the method evaluates whether the enumeration message is acommand or a response. In response to identifying the enumerationmessage as a command, the method selectively sends an enumerationresponse message that indicates the distinctive device identifier valueto the host device, at 1910. The enumeration response message may besent to the host device directly or may be sent to the host device viaone or more other devices. The enumeration response message may alsoinclude cyclic redundancy check (CRC) data to allow the host to conducterror detection.

In response to identifying the enumeration message as a response messagefrom one of the other devices, at 1906, the method reads from theresponse message an identifier value used by such other device, at 1908,and at least temporarily stores this identifier value (i.e. theidentifier value read from the response message) at the device to enablethe device to select its distinctive device identifier value (i.e. toselect the distinctive device identifier value for the device). Forexample, the device 240 of FIG. 2 may read an identifier value used bythe device 220 from the response message 226 of FIG. 2. The identifiervalue read from the response message is at least temporarily stored atthe device to enable selection of a device identifier value that isdistinct from the device identifier read from the response message. Theselected device identifier value enables a host device to access thedevice by use of the distinctive device identifier value, such as byspecifying the device as a message recipient.

Referring to FIG. 20, another embodiment of a method of selecting anidentifier value at a device is shown. The method includes receiving anenumeration message via a host interface, at 2002, and identifying theenumeration message as a command originated by a host device or as aresponse message, at 2004. The command or response determination is madeat 2006. Upon determining that the enumeration message is a response,the method reads an identifier value used by another device coupled to amemory device interface of a host device from the response message, at2008. The method also stores the identifier value read from the responsemessage to a used identifier value storage area, at 2010. For example,the used identifier value storage area may be the storage areaillustrated as storing the table 250 of FIG. 2.

Upon determining that the enumeration message is a command, the methodselects a distinctive device identifier value to be distinct from eachused identifier value that is stored at the used identifier valuestorage, at 2012. As part of making the selection of the distinctivedevice identifier value, the method may include comparing a deviceidentifier value to each used identifier value that is stored at theused identifier value storage to generate the distinctive identifiervalue, at 2014, and alternatively, or in addition, performs acomputation that generates the distinctive device identifier value basedon each used identifier value that is stored at the used identifiervalue storage, at 2016. The device may be configured to accumulatemultiple used identifier values at the used identifier storage. Themethod may compare a device identifier value to each used identifiervalue that is stored at the used identifier value storage to generatethe distinctive identifier value. Thus, the distinctive deviceidentifier value may be selected to be distinct from each usedidentifier value that is stored at the used identifier value storage.

The method then selectively sends an enumeration response message thatindicates the distinctive device identifier value to the host device, at2018. For example, the method may include determining whether the deviceis an addressed recipient of the command, such as described with respectto decision 1312 of FIG. 13. For example, the command is forwardedwithout sending the enumeration response message in response to thecommand indicating one or more recipients but not indicating the deviceas a recipient.

Referring to FIG. 21, another embodiment of a method of selecting anidentifier value at a device is shown. The method includes receiving anenumeration message via a host interface, at 2102, and identifying theenumeration message as a command originated by a host device or as aresponse message, at 2104. The command or response determination is madeat 2106. Upon determining that the enumeration message is a response,the method reads an identifier value used by another device coupled tothe memory device interface from the response message, at 2108. Themethod also stores the identifier value read from the response messageto a used identifier value storage area, at 2110. The method may alsoincludes replacing a stored used identifier value at the used identifiervalue storage with the identifier value read from the response message.

Upon determining that the enumeration message is a command, the methodselects a distinctive device identifier value to be distinct from eachused identifier value that is stored at the used identifier valuestorage, at 2112. As part of making the selection of the distinctivedevice identifier value, the method may add an offset value to a mostrecently stored used identifier value at the used identifier valuestorage to generate a result that is greater than the most recentlystored used identifier value, as shown at 2114. Alternatively, or inaddition, the device may use a most recently stored used identifiervalue at the used identifier value storage as a threshold value thatdefines an allowed identifier range of values, and the method may selectthe distinctive device identifier value by selecting the deviceidentifier value to be within the allowed identifier range of values, at2116. For example, if the most recently stored used identifier value hasa value of two, the method would define an allowed identifier range ofvalues as values greater than two. The method could then select adistinctive identifier value by selecting a value greater than two (e.g.three). The method then selectively sends an enumeration responsemessage that indicates the distinctive device identifier value to thehost device, at 2118. For example, the method may select whether to sendan enumeration response in based on a determination whether the deviceis an addressed recipient of the command, such as described with respectto decision 1312 of FIG. 13.

Referring to FIG. 22, another embodiment of a method of selecting anidentifier value at a device is shown. The method includes receiving anenumeration message via a host interface, at 2202, and identifying theenumeration message as a command originated by a host device or as aresponse message, at 2204. The command or response determination is madeat 2206. Upon determining that the enumeration message is a command, themethod selectively sends an enumeration response message that indicatesa distinctive device identifier to the host device, the enumerationresponse message including a distinctive device identifier value, at2208.

Upon determining that the enumeration message is a response, the methodreads an identifier value used by another device coupled to the memorydevice interface from the response message, at 2210. In a particularillustrative example, the device has a second device position on acommunication path and the response message originates from a firstdevice having a first device position along the communication path. Theresponse message may include a used identifier value of any device thathas a corresponding position on the communication path between the firstdevice position and the second device position.

The method may include selecting the distinctive device identifier valueto be distinct from any used identifier value in the response message,at 2212. For example, the method may include using a received usedidentifier value as a threshold value to define an allowed identifierrange of values, at 2214. The method may also include selecting thedistinctive device identifier value by selecting the device identifiervalue to be within the allowed identifier range of values, at 2214.

The method further includes generating a second response message thatincludes each used identifier value identified by the response messageand that includes the distinctive device identifier value, at 2216, andsending the second response message along the communication path, at2220. As an illustrative example, the method may generate the secondresponse message by updating the response message by adding thedistinctive device identifier value to a first unused field of a set ofdevice identifier fields in the response message, at 2218. The methodmay send the second response message by forwarding the updated responsemessage including the distinctive device identifier value along thecommunication path to the next device, as shown at 2222.

In another illustrative example, a third device (e.g. device 260 of FIG.2) has a last device position on the communication path and thedistinctive device identifier value and each used identifier valueincluded in the second response message is accessible to the thirddevice and to any other device having a position on the communicationpath between the second device position and the last device position. Asa result, as each device receives the propagated response, each devicemay read all used identifier values corresponding to devices having madeidentifier selection, select a distinctive identifier value, and forwardthe updated response to the next device along the communication path.Therefore, a single response including a set of distinctive identifiervalues may be received by the host device, such as the response 1166 ofFIG. 11.

Referring to FIG. 23, a method of enumerating devices coupled to amemory device interface of a host device is shown. The memory deviceinterface is operatively coupled to multiple devices including a firstdevice and a second device. For example, the memory device interface 212of the host device 210 may be coupled to the first device 220, to thesecond device 240, and to other devices such as the third device 260, asshown in FIG. 2. The method includes sending a first enumeration commandvia the memory device interface, the first enumeration command includinga command indicator, at 2310, and receiving distinctive deviceidentifier values via one or more enumeration response messages, at2312. In a particular example, a first distinctive identifier valuecorresponds to the first device and a second distinctive identifiervalue corresponds to the second device. To facilitate selection ofdistinctive device identifiers at a device (e.g. the second device 240)coupled to the host device, data indicating one or more used identifiervalues including the first distinctive identifier value is provided tothe second device prior to selection of the second distinctiveidentifier value. The second distinctive identifier value enables thehost device to specifically identify the second device as a messagerecipient. To illustrate, the host device may access the second deviceby using the second distinctive identifier value to specify the seconddevice as a message recipient. For example, the host device 210, uponreceiving the second device identifier of the second device 240, maycommunicate messages to the second device 240 by use of the seconddevice identifier.

As a result, the enumeration operation is performed with each deviceselecting its identifier value to be other than previously selectedidentifier values (if any). The enumeration operation efficiently usestransmission cycles by eliminating the possibility that any devicechooses an identifier value that is already used, thus eliminatingmessaging from the host device instructing devices to re-selectidentifier values and messaging from the devices to the host device witha next selected identifier value. As a result, the enumeration cycle canbe completed efficiently for a large number of devices.

Although various components depicted herein are illustrated as blockcomponents and described in general terms, such components may includeone or more microprocessors, state machines, or other circuitsconfigured to enable the memory device 120 of FIG. 1, the device 220,240, or 260 of FIGS. 2-4, the device 520 or 540 of FIG. 5, the device620, 640, or 660 of FIGS. 6-8, the device 920, 940, or 960 of FIGS.9-11, the storage device 1220 of FIG. 12, the data storage device 1520of FIG. 15, the data storage device 1620 of FIG. 16, the data storagedevice 1720 of FIG. 17, or the wireless communication device 1820 ofFIG. 18, to perform the particular functions attributed to suchcomponents, or any combination thereof.

In a particular embodiment, the data storage device 1520 may be aportable device configured to be selectively coupled to one or moreexternal devices. However, in other embodiments, the memory device maybe attached or embedded within one or more host devices, such as withina housing of a portable communication device. For example, the datastorage device 1520 may be within a packaged apparatus such as awireless telephone, personal digital assistant (PDA), gaming device orconsole, portable navigation device, or other device that uses internalnon-volatile memory. In a particular embodiment, the non-volatile memory1534 of the data storage device 1520 is a flash memory (e.g., NAND, NOR,Multi-Level Cell (MLC), Divided bit-line NOR (DINOR), AND, highcapacitive coupling ratio (HiCR), asymmetrical contactless transistor(ACT), or other flash memories), an erasable programmable read-onlymemory (EPROM), an electrically-erasable programmable read-only memory(EEPROM), a read-only memory (ROM), a one-time programmable memory(OTP), or any other type of memory.

The illustrations of the embodiments described herein are intended toprovide a general understanding of the various embodiments. Otherembodiments may be utilized and derived from the disclosure, such thatstructural and logical substitutions and changes may be made withoutdeparting from the scope of the disclosure. This disclosure is intendedto cover any and all subsequent adaptations or variations of variousembodiments. Accordingly, the disclosure and the figures are to beregarded as illustrative rather than restrictive.

The above-disclosed subject matter is to be considered illustrative, andnot restrictive, and the appended claims are intended to cover all suchmodifications, enhancements, and other embodiments, which fall withinthe scope of the present disclosure. Thus, to the maximum extent allowedby law, the scope of the present invention is to be determined by thebroadest permissible interpretation of the following claims and theirequivalents, and shall not be restricted or limited by the foregoingdetailed description.

What is claimed is:
 1. A method of selecting an identifier value, themethod comprising: at a device with a host interface, wherein the deviceis operatively coupled via the host interface to a host device as wellas to one or more other devices, and wherein the device is operative toselect a distinctive device identifier value, the distinctive deviceidentifier value different from any identifier value that any of the oneor more other devices have indicated as being used, performing:receiving a first enumeration message from the host device prior toreceiving, from any of the one or more other devices, an identifiervalue indicated as being used, wherein the first enumeration messageincludes a parameter; selecting the distinctive device identifier valueaccording to a first selection rule or according to a second selectionrule based on the parameter; generating a second enumeration message,the second enumeration message including a set of device identifierfields, wherein a first identifier field of the set of device identifierfields includes the distinctive device identifier value; and sending thesecond enumeration message to the host device.
 2. The method of claim 1,wherein the device is operatively coupled to the host device via acommunication path that includes the one or more other devices, whereinthe first enumeration message is sent as a first broadcast command viathe communication path, and wherein sending the second enumerationmessage to the host device is performed by sending the secondenumeration message as a second broadcast command via the communicationpath.
 3. The method of claim 1, wherein the distinctive deviceidentifier value being in the first device identifier field identifiesthe device as being in a first position to receive messages from thehost device along a communication path relative to the one or more otherdevices.
 4. The method of claim 1, wherein selecting the distinctivedevice identifier value includes selecting a random or pseudo-randomvalue.
 5. The method of claim 4, wherein the first enumeration messageincludes an identifier value threshold, and wherein selecting thedistinctive device identifier value includes adding an offset to theidentifier value threshold.
 6. The method of claim 5, wherein the offsethas a value of one.
 7. A data storage device comprising: a hostinterface configured to operatively couple the data storage device to ahost device and to one or more other devices; and a controller coupledto the host interface, wherein the controller is configured to: receivea first enumeration message from the host device prior to receiving anidentifier value from any of the one or more other devices, wherein thefirst enumeration message includes a parameter; determine a deviceidentifier value according to a first selection rule or according to asecond selection rule based on the parameter; generate a secondenumeration message, the second enumeration message including a set ofdevice identifier fields, wherein a first identifier field of the set ofdevice identifier fields includes the device identifier value; and sendthe second enumeration message to the host device.
 8. The data storagedevice of claim 7, wherein the host interface is configured tooperatively couple the data storage device to the host device via acommunication path that includes the one or more other devices, whereinthe first enumeration message is sent as a first broadcast command viathe communication path, and wherein the controller is configured to sendthe second enumeration message to the host device by sending the secondenumeration message as a second broadcast command via the communicationpath.
 9. The data storage device of claim 7, wherein the deviceidentifier value being in the first device identifier field identifiesthe device as being in a first position to receive messages from thehost device along a communication path relative to the one or more otherdevices.
 10. The data storage device of claim 7, wherein determining thedevice identifier value includes selecting a random value or apseudo-random value.