Ex Parte DeLano - Page 10


                   Appeal No. 2006-1550                                                                                           
                   Application No. 10/044,401                                                                                     

                          necessary to format data with smaller length bit that can be read by width with                         
                          greater length bit. In other words, a 24 bit width port can read any data bits that                     
                          are equal to or fewer than 24 bit length, but not data that are more than 24 bit                        
                          length.                                                                                                 
                          [0030] However, if the width of the input port is more than the width of the output                     
                          port (block 200), modification to the data is necessary in order to transmit the data                   
                          to a port with less available width. Thus, the width of the output port must be                         
                          ascertained (block 204) in order to format the data from the input port to data                         
                          configured for the width of the output port (block 206). The formatted data will be                     
                          submitted as the processed data. In practice, the data will be transmitted by                           
                          shifting the data bits to the width of the output port. For example, if a 24 bit width                  
                          input port requests to transmit data to an output port with an 8 bit width, the data                    
                          will then be shifted or divided into 8 bit for each transmission. Since there are 24                    
                          bits total, the data will be transmitted 8 bits at a time until all 24 bits are sent. This              
                          can be done either through the use of a MUX or a shift register.                                        
                          Thus, the claims do require determining whether the width of the input port is                          
                   more than the width of the output port; submitting the data as processed when the width                        
                   of the input port is not more than the width of the output port; obtaining the width of the                    
                   output port when the width of the input port is greater than width of the output port;                         
                   formatting the data from the input port to data configured for the obtained width of the                       
                   output port; submitting the formatted data as the processed data.                                              
                          Now the question before us is what the combination of Yokoyama and Lach                                 
                   would have taught to one of ordinary skill in the art?  To answer this question, we find                       
                   the following facts:                                                                                           
                          At page 54, paragraphs 0147 through 150, Yokoyama states the following:                                 
                          [0147] Figure 24 shows the division of a data transfer in the crossbar switch                           
                          device 1 of an application example of the present invention.  In the figure, C1                         
                          shows the case where a band of 256 bits can be secured when data of 256 bits are                        
                          transferred to a 256-bit port, C2 shows the case where a band/14 of 128 bits can                        
                          be secured when data of 256 bits are transferred to a 256-bit port, and C3 shows                        
                          the case where a band cannot be secured when data of 256 bits are transferred to a                      
                          256-bit port.                                                                                           


                                                               10                                                                 



Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  Next 

Last modified: November 3, 2007