Patent classifications
G06F13/426
PRESERVATION OF PORT CONTROL BLOCK INFORMATION RELATED TO LOGINS AND STATES OF REMOTE PORTS DURING A CODE LOAD IN AN EMBEDDED PORT
Information maintained in a port control block of an embedded port of a host bus adapter is stored in a host bus adapter memory, wherein the information corresponds to login attributes and state data of remote ports. In response to storing the information in the host bus adapter memory, code in the embedded port is updated. In response to the updating of the code in the embedded port, the stored information is restored from the host bus adapter memory to the port control block of the embedded port.
Technique for correcting a time parameter
A device for correcting a time parameter in a first node in accordance with a second node is provided. The device includes a clock pulse generator unit configured to provide periodic clock pulses in the first node. The device further includes a peripheral unit configured to decode symbols of an asynchronously transmitted telegram from the second node and to measure a number of clock pulses during the transmission of a symbol sequence of consecutive symbols of the telegram. The device also includes a correction unit configured to correct the time parameter as a function of a ratio of the measured number of clock pulses and the number of consecutive symbols in the symbol sequence.
Multiple transaction data flow control unit for high-speed interconnect
Methods, apparatus, and systems, for transporting data units comprising multiple pieces of transaction data over high-speed interconnects. A flow control unit, called a KTI (Keizer Technology Interface) Flit, is implemented in a coherent multi-layer protocol supporting coherent memory transactions. The KTI Flit has a basic format that supports use of configurable fields to implement KTI Flits with specific formats that may be used for corresponding transactions. In one aspect, the KTI Flit may be formatted as multiple slots used to support transfer of multiple respective pieces of transaction data in a single Flit. The KTI Flit can also be configured to support various types of transactions and multiple KTI Flits may be combined into packets to support transfer of data such as cache line transfers.
Systems and Methods for Identifying Storage Resources That Are Not In Use
An apparatus, system, and method are disclosed for managing a non-volatile storage medium. A storage controller receives a message that identifies data that no longer needs to be retained on the non-volatile storage medium. The data may be identified using a logical identifier. The message may comprise a hint, directive, or other indication that the data has been erased and/or deleted. In response to the message, the storage controller records an indication that the contents of a physical storage location and/or physical address associated with the logical identifier do not need to be preserved on the non-volatile storage medium.
Lite network switch architecture
Disclosed embodiments include a network switch having a first number of switch elements and a second number of switch elements cross-connected to the first switch elements to passively route network traffic through the network switch in accordance with a predefined configuration.
Management controller including virtual USB host controller
Various examples described herein provide for a management controller that includes a virtual universal serial bus (USB) host controller that can emulate an actual USB host controller to a central processor. A particular endpoint from a number of endpoints is associated with a virtual USB device that is coupled to the virtual USB host controller. The particular endpoint is to refer to a location in a management memory.
Systems and methods for identifying storage resources that are not in use
A method for managing data in a NAND flash storage system is provided. The method includes one or more of receiving an empty data segment directive at a storage controller, returning a data string including data of a predetermined logic level in response to a read command requesting to read data associated with a logical identifier included in the empty data segment directive, maintaining an index of mapping between the logical identifier and a physical storage location, updating the index to indicate data at the physical storage location does not need to be preserved, monitoring one or more physical storage locations, including the physical storage location, to determine a percentage of the one or more physical storage locations that do not need to be preserved, and initiating garbage collection on the one or more physical storage locations in response to the percentage reaching a threshold. The empty data segment directive includes a logical identifier associated with the physical storage location.
Method and apparatus for providing virtual machine information to a network interface
A hypervisor preferably provides VM (virtual machine) identification, priority and LUN/LBA range information to the HBA (host bus adapter) when a VM is created. Alternatively, the HBA can determine that a LUN/LBA range is new and request VM identity, priority and LUN/LBA range from the hypervisor. The HBA creates a table containing the VM identification, priority and LUN/LBA range. The HBA then detects operations directed to the LUN/LBA range and does a lookup to determine VM identification and priority. VM identification and priority are then mapped into a field in a frame using a unique identifier. The unique identifier can be placed using reserved bits on the existing Fiber Channel (FC) header or can use bits in an additional header, such as a modified IFR header or an optional device header. The VM identification aware HBAs register with the NS.
Fibre channel storage array having standby controller with ALUA standby mode for forwarding SCSI commands
Storage arrays, systems and methods for processing commands to enable SCSI-level forwarding between an active controller and a standby controller are provided. In one example, the standby controller has ports that operate in an asymmetric logical unit access (ALUA) standby (SB) mode. One such method includes receiving a command by a port of the standby controller, wherein the port operates in the ALUA SB mode. The method includes identifying that the command is of a type that is predefined for forwarding, and forwarding the command from a SCSI layer of the standby controller to a SCSI layer of the active controller. The method further includes processing the command in a user space of the active controller to generate return data and forwarding the return data from the active controller to the standby controller. The method additionally includes sending the return data to the initiator, over the port of the standby controller.
Methods and systems for overlapping protection domain in network devices
Methods and systems for securing data are provided. For example, one method includes receiving at an adapter, data with a first type of error protection code from a host memory of a computing device; adding by the adapter a second type of error protection code to the data before removing the first type of error protection code; generating by the adapter, a frame header for the data with a protocol specific protection code and a third type of error protection code, where the third type of error protection code is generated without using any frame header field; encrypting by the adapter, the data, the protocol specific protection code and the third type of error protection code; and transmitting by the adapter, the encrypted data with encrypted protocol specific protection code and encrypted third type of error protection code to a receiving adapter coupled to the adapter by a network link.