Transparent failover in a network interface controller

    公开(公告)号:US20200007383A1

    公开(公告)日:2020-01-02

    申请号:US16024864

    申请日:2018-07-01

    Abstract: A network interface apparatus includes a host interface for connection to a host processor and a network interface, which includes multiple distinct physical ports. Processing circuitry associates each of a plurality of virtual entities running on the host processor with a respective one of the physical ports, so that while both of the first and second physical ports are operational, the processing circuitry transmits data packets on behalf of first and second virtual entities, using assigned upper-layer addresses, through associated first and second physical ports. In response to an indication that the first physical port has ceased to operate, the processing circuitry transmits the data packets on behalf of the first virtual entity through the second physical port without changing the upper-layer addresses.

    Configurable AEN notification
    12.
    发明授权

    公开(公告)号:US10404530B2

    公开(公告)日:2019-09-03

    申请号:US14534207

    申请日:2014-11-06

    Abstract: Computerized methods and systems are disclosed for configuring a network controller (NC). These methods and systems recognize, via a network device, e.g., hardware, software, processors, storage media, memory, a predetermined command from a management controller (MC). The network device responds to the predetermined command by configuring the NC with a message type associated with an event, and controlling enablement of a message associated with the message type using a selectable enable bit as defined in the predetermined command.

    SIMULTANEOUS OPERATION OF REMOTE MANAGEMENT AND LINK AGGREGATION
    15.
    发明申请
    SIMULTANEOUS OPERATION OF REMOTE MANAGEMENT AND LINK AGGREGATION 有权
    远程管理和链路聚合的同时运行

    公开(公告)号:US20150172112A1

    公开(公告)日:2015-06-18

    申请号:US14547160

    申请日:2014-11-19

    Abstract: A method in a network node that includes a network adapter, a Baseboard Management Controller (BMC) and a host, includes connecting to a switch in a communication network using first and second ports of the network adapter, as member ports of a Link Aggregation Group (LAG). Management and data packets are simultaneously exchanged over the communication network via the LAG member ports, so that the management packets are exchanged between the BMC and a control server, and the data packets between the host and a remote node.

    Abstract translation: 包括网络适配器,基板管理控制器(BMC)和主机的网络节点中的方法包括使用网络适配器的第一和第二端口连接到通信网络中的交换机作为链路聚合组的成员端口 (落后)。 通过LAG成员端口在通信网络上同时交换管理和数据包,使得管理包在BMC和控制服务器之间交换,数据包在主机和远程节点之间交换。

    Enhanced storage protocol emulation in a peripheral device

    公开(公告)号:US11934658B2

    公开(公告)日:2024-03-19

    申请号:US17527197

    申请日:2021-11-16

    CPC classification number: G06F3/0613 G06F3/0647 G06F3/0659 G06F3/067

    Abstract: A peripheral device includes a host interface and processing circuitry. The host interface is to communicate with one or more hosts over a peripheral bus.
    The processing circuitry is to expose on the peripheral bus a peripheral-bus device that communicates with the one or more hosts using one or more instances of at least one bus storage protocol, to receive, using the exposed peripheral-bus device, Input/Output (I/O) transactions that are issued by the one or more hosts, and to complete the I/O transactions for the one or more hosts in accordance with one or more instances of at least one network storage protocol, by running at least part of a host-side protocol stack of the at least one network storage protocol.

    Accelerating and offloading lock access over a network

    公开(公告)号:US09699110B2

    公开(公告)日:2017-07-04

    申请号:US14753159

    申请日:2015-06-29

    Abstract: Lock access is managed in a data network having an initiator node and a remote target by issuing a lock command from a first process to the remote target via an initiator network interface controller to establish a lock on a memory location, and prior to receiving a reply to the lock command communicating a data access request to the memory location from the initiator network interface controller. Prior to receiving a reply to the data access request, an unlock command issues from the initiator network interface controller. The target network interface controller determines the lock content, and when permitted by the lock accesses the memory location. After accessing the memory location the target network interface controller executes the unlock command. When the lock prevents data access, the lock operation is retried a configurable number of times until data access is allowed or a threshold is exceeded.

    ACCELERATING AND OFFLOADING LOCK ACCESS OVER A NETWORK
    20.
    发明申请
    ACCELERATING AND OFFLOADING LOCK ACCESS OVER A NETWORK 有权
    通过网络加速和卸载锁定访问

    公开(公告)号:US20160043965A1

    公开(公告)日:2016-02-11

    申请号:US14753159

    申请日:2015-06-29

    Abstract: Lock access is managed in a data network having an initiator node and a remote target by issuing a lock command from a first process to the remote target via an initiator network interface controller to establish a lock on a memory location, and prior to receiving a reply to the lock command communicating a data access request to the memory location from the initiator network interface controller. Prior to receiving a reply to the data access request, an unlock command issues from the initiator network interface controller. The target network interface controller determines the lock content, and when permitted by the lock accesses the memory location. After accessing the memory location the target network interface controller executes the unlock command. When the lock prevents data access, the lock operation is retried a configurable number of times until data access is allowed or a threshold is exceeded.

    Abstract translation: 在具有发起者节点和远程目标的数据网络中通过经由发起者网络接口控制器向远程目标发出锁定命令来向远程目标发出锁定访问,以在存储器位置上建立锁定,并且在接收到回复之前 该锁定命令从发起者网络接口控制器向存储器位置传送数据访问请求。 在接收到数据访问请求的答复之前,解锁命令从发起者网络接口控制器发出。 目标网络接口控制器确定锁定内容,并且当锁定允许访问存储器位置时。 访问内存位置后,目标网络接口控制器执行unlock命令。 当锁定阻止数据访问时,重试锁定操作可配置次数,直到允许数据访问或超过阈值。

Patent Agency Ranking