G06F11/2002

Error-handling flows in memory devices based on bins

An example memory sub-system includes a memory device and a processing device, operatively coupled to the memory device. The processing device is configured to detect a power-up state of the memory device following a power loss event; detect a read error with respect to data residing in a block of the memory device, wherein the block is associated with a current voltage offset bin; and perform temporal voltage shift (TVS)-oriented calibration for associating the block with a new voltage offset bin.

Adaptive private network with path maximum transmission unit (MTU) discovery process

Systems and techniques are described for a path maximum transmission unit (MTU) discovery method that allows the sender of IP packets to discover the MTU of packets that it is sending over a conduit to a given destination. The MTU is the largest packet that can be sent through the network along a path without requiring fragmentation. The path MTU discovery method actively probes each sending path of each conduit with fragmentation enabled to determine a current MTU and accordingly increase or decrease the conduit MTU. The path MTU discovery process is resilient to errors and supports retransmission if packets are lost in the discovery process. The path MTU discovery process is dynamically adjusted at a periodic rate to adjust to varying network conditions.

Active-active architecture for distributed ISCSI target in hyper-converged storage

A method is provided for a hyper-converged storage-compute system to implement an active-active failover architecture for providing Internet Small Computer System Interface (iSCSI) target service. The method intelligently selects multiple hosts to become storage nodes that process iSCSI input/output (I/O) for a target. The method further enables iSCSI persistent reservation (PR) to handle iSCSI I/Os from multiple initiators.

Reducing recovery time of an application

Examples provided herein describe a method for reducing recovery time for an application. For example, a first physical processor of a computing device may monitor, based on a first application instance of the application running in a first mode, for failure detection of the first application instance running on a first computing device. The first physical processor may determine that the first application instance is to be changed from the first mode to a second mode. Based on the determination, the first physical processor may validate that a second application instance can run in the first mode by performing a data integrity compliance check. Responsive to validating that the second application instance can run in the first mode, the first physical processor may facilitate running of the second application instance in the first mode.

Intelligent data plane acceleration by offloading to distributed smart network interfaces
11645104 · 2023-05-09 · ·

A system for processing data, comprising a compute node having a first processor that is configured to receive a digital data message containing a request for computing services and to allocate processing resources on a private network as a function of the request. A smart network interface controller (NIC) management system operating on a second processor and configured to cause the second processor to select a smart NIC associated with the private network to allocate the smart NIC to the computing services. The smart NIC includes a processor that is configured to interface with a public network and to send and receive data over the public network associated with the computing services.

Control device, method, and computer-readable storage medium
11687397 · 2023-06-27 · ·

There is provided a device including: a diagnosis unit configured to diagnose an input and output function, in an input and output device that is configured to perform an input and output operation in accordance with the input and output function programmed in programmable circuitry; an error detection unit configured to detect an error of a configuration storage area; and an abnormality determination unit configured not to determine an abnormality of the input and output device when the error of the configuration storage area is detected and the input and output function is diagnosed to be normal.

Automatic non-disruptive connection recovery of a fixed topology fabric in a data storage system

Individual transport connections within a dual-star fabric connected multi-node storage system are disabled in response to associated failures due to faulty hardware or temporal congestion. Each configured IB transport connection is monitored for viability and, upon failure, removed from the pool of available resource. Following failure restoration the resource is tested to ensure proper functionality and then restored to the pool of resources. Mappings associated with the transport connections are maintained while the connections are disabled.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MANAGING SUSPECT SUBSCRIBER BINDINGS

Methods, systems, and computer readable media for managing suspect subscriber bindings. In some examples, a method is performed by a Diameter signaling router (DSR) for a telecommunications network. The method includes binding a subscriber to a first policy and charging rules function (PCRF) server selected from a plurality of PCRF servers for the telecommunications network. The method includes determining that one or more messages destined to the first PCRF server have failed according to one or more user-configurable rules defining failure. The method includes tearing down the binding between the subscriber and the first PCRF server.

FAILOVER OF A VIRTUAL FUNCTION EXPOSED BY AN SR-IOV ADAPTER

Failover of a virtual function exposed by an SR-IOV adapter of a computing system, including: instantiating, by a hypervisor, a standby virtual function in the computing system; detecting a loss of communication between a logical partition and an active virtual function mapped to the logical partition; placing the active virtual function and the standby virtual function in an error state; remapping the logical partition to the standby virtual function; and placing the standby virtual function in an error recovery state.

CONTROLLER AREA NETWORK (CAN) BUS SECURITY INVENTION
20220038304 · 2022-02-03 · ·

A serial communication system for communicating data over a Controller Area Network (CAN) bus comprises a security slave device located between a first system node and a Controller Area Network (CAN) bus. The system is characterised in that: said security slave device further comprises a tagging means for inserting data indicative of said first node into a Controller Area Network (CAN) frame received from said first node; said system further comprises a security master device, located between said Controller Area Network (CAN) bus and a second system node; said security master device further comprises a means of extracting said data indicative of first said node from a received data frame; and said system further comprises a means of checking the validity of received Controller Area Network (CAN) frame associated to said extracted data indicative of said first node.