15.08.2013 Views

DESIGN OF A CUSTOM ASIC INCORPORATING CAN™ AND 1 ...

DESIGN OF A CUSTOM ASIC INCORPORATING CAN™ AND 1 ...

DESIGN OF A CUSTOM ASIC INCORPORATING CAN™ AND 1 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.3.6 1 – Wire® Search Algorithm<br />

Figure 2.13 Read Zero Time Slot.<br />

As stated previously, all 1 – Wire® slaves each have a 64 – bit unique registration<br />

number in ROM that is used to address them individually by a 1 – Wire® Master. If the ROM<br />

numbers of the slave devices on the 1 – Wire® network are not known, then they can be<br />

discovered by using a search algorithm. This is a binary tree search where branches are followed<br />

until a device ROM number, or leaf, is found. Subsequent searches then take the other branch<br />

paths until all of the leaves present are discovered.<br />

The search algorithm begins with the devices on the 1 – Wire® being reset using the reset<br />

and presence pulse sequence. If this is successful then the 1 – byte search command is sent. The<br />

search command readies the 1 – Wire® devices to begin the search. There are two types of<br />

search commands. The normal search command (0xF0) will perform a search with all devices<br />

22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!