摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
An optical communication serial interface is employed to power up a device from a powered down state to a powered on state. An optical receiver element receives serial optical signals transmitted by at least one optical fiber and converts the received serial optical signals to electrical signals. A low level reception converter detects and decodes the electrical signals to provide data and control words from detected and decoded normal electrical signals for a high level command processor. A power supply maintains low level power to at least the optical receiver element and the low level reception converter of the optical communication serial interface while the device is in the powered down state. The low level reception converter detects a particular abnormal sequence of electrical signals; and in response to detecting the particular abnormal sequence of electrical signals, asserts a control signal to power up the device controllable power supply.
摘要:
Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure.
摘要:
A method to set a communication speed in a Serial-Attached Small Computer System Interface (“SAS”)/Serial-ATA (“SATA”) distance extender apparatus comprising a plurality of supported communication speeds and a local communication speed, a fibre channel interface, a memory, a processor, and a communication bus interconnecting the SAS/SATA Interface, the Fibre Channel interface, the memory, and the processor. The method detects traffic received by the Fibre Channel interface, and determines if the traffic comprises a SAS/SATA Open Address frame If the traffic comprises a SAS/SATA Open Address frame, the method then determines if the local communication speed matches a communication speed utilized by an interconnected remote SAS/SATA Interface. If the local communication speed matches a communication speed utilized by an interconnected remote SAS/SATA Interface, the method transmits the traffic using the local SAS/SATA Interface.
摘要:
A system, method and computer program product for archiving image, audio, and text data with metadata encapsulation in a client-server storage library is described. The server receives and holds the images, audio, or text to be archived in an image, audio or text logical partition which includes a directory of the images, audio, or text. The information is encapsulated in a metadata wrapper and stored in the library as a closed image, audio, or text file along with a closed copy of the directory. The closed image, audio, or text directory is also stored in the client. The images may be encapsulated in MXF, DICOM, Tape Archive (TAR) or GZIP formats. The storage library may have magnetic tapes, magnetic disks or optical disks as storage media.
摘要:
In remote power down control of a device configured for externally initiated remote power down, such as over a network, activity of all externally connected sources of valid power down requests for the device is monitored; and the device is powered down in response to a combination of one of a received power down request and an inactivity time out with respect to each of the sources of valid power down requests for the device.
摘要:
A system, method and computer program product for archiving image, audio, and text data with metadata encapsulation in a client-server storage library is described. The server receives and holds the images, audio, or text to be archived in an image, audio or text logical partition which includes a directory of the images, audio, or text. The information is encapsulated in a metadata wrapper and stored in the library as a closed image, audio, or text file along with a closed copy of the directory. The closed image, audio, or text directory is also stored in the client. The images may be encapsulated in MXF, DICOM, Tape Archive (TAR) or GZIP formats. The storage library may have magnetic tapes, magnetic disks or optical disks as storage media.
摘要:
Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure.
摘要:
A method to set a communication speed in a Serial-Attached Small Computer System Interface (“SAS”)/Serial-ATA (“SATA”) distance extender apparatus comprising a plurality of supported communication speeds and a local communication speed, a fibre channel interface, a memory, a processor, and a communication bus interconnecting the SAS/SATA Interface, the Fibre Channel interface, the memory, and the processor. The method detects traffic received by the Fibre Channel interface, and determines if the traffic comprises a SAS/SATA Open Address frame. If the traffic comprises a SAS/SATA Open Address frame, the method then determines if the local communication speed matches a communication speed utilized by an interconnected remote SAS/SATA Interface. If the local communication speed matches a communication speed utilized by an interconnected remote SAS/SATA Interface, the method transmits the traffic using the local SAS/SATA Interface.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.