摘要:
Provided are techniques for writing doorbell information. In accordance with certain techniques, one or more protection domains are created. One or more data structures are created, wherein each of the data structures is associated with at least one protection domain. One of the data structures is updated. A doorbell structure address for a doorbell structure associated with the updated data structure is computed. Doorbell information is written at the computed doorbell structure address. In accordance with certain other techniques, doorbell information is received. A doorbell structure address is decoded from the doorbell information. A first protection domain identifier is determined from the doorbell structure address. A resource context of a data structure is determined from the doorbell information. The resource context at the doorbell address is read to determine a second protection domain identifier. The first protection domain identifier and the second protection domain identifier are compared to determine whether to update the resource context of the doorbell structure. Other embodiments are described and claimed.
摘要:
Provided are a method, system, and program for managing memory options for a device such as an I/O device. Private addresses provided by logic blocks within the device may be transparently routed to either an optional external memory or to system memory, depending upon which of the optional memories the private address has been mapped.
摘要:
Certain aspects of a method and system for managing network power policy and configuration of data center bridging may include a network domain that comprises a single logical point of management (LPM) that coordinates operation of one or more devices, such as network interface controllers (NICs), switches, and/or servers in the network domain: The single LPM may be operable to manage one or both of a network power policy and/or a data center bridging (DCB) configuration policy for the network domain.
摘要:
For a platform level data model for indications based event control and data transfer, a management controller may enable performing indications based management operations that may be based on a management service utilizing CIM Indications model. The management controller may enable communication of indications based messaging and/or data. The indications may be triggered based on events generated and/or triggered in a plurality of managed entities. The events generation may be performed dynamically within the plurality of managed entities, or may be initiated via the management controller. The management controller may enable processing of partially generated indications, via the plurality of managed entities, and/or as pass-through router for full indications processed via the plurality of managed entities. The indications based management operations may also comprise subscription related operations wherein the management controller may enable performing processing of subscription requests, modifications, and/or deletions to facilitate external access via the device.
摘要:
Methods and systems for data communication are disclosed and may include utilizing a multi-level lookup process for determining IPsec parameters from a security association database. The security association database may be stored in content addressable memory, and may include an Internet protocol address table, a security association lookup table, and a security association context table. The security association lookup and security association context tables may include a single table. An Internet protocol address table index may be looked up in the Internet protocol address table for a first lookup of the multi-level lookup process. A security protocol index may be looked up utilizing the Internet protocol address table index for a second lookup of the multi-level lookup process. The Internet protocol security parameters may be determined utilizing the security protocol index. IPsec processing may be performed utilizing the determined Internet protocol security parameters.
摘要:
A portion of management traffic, carried via network traffic, and received and/or transmitted via a network controller, may be processed externally to the network controller, wherein management messaging may be carried via network packets, and one or more headers may added to enable transmission and/or reception via the network controller. Packet filters may be setup, in the network controller, via the management controller, to enable determining network packets that may carry the management traffic. The management controller may utilize commands to setup packet filers in the network controller, wherein matching criteria, in received network packets, and/or corresponding actions that may be performed in matching packets, may be specified. The matching criteria may comprise specifying one or more header types that may be utilized in the received network packets. The network controller may generate filter identifiers, which may be utilized, subsequently, via the management controller to delete the packet filters.
摘要:
Certain aspects of a method and system for light-weight simple object access protocol (SOAP) transport for web services based management are disclosed. Aspects of a method may include managing a system using a simple object access protocol (SOAP) message that is mapped over one or both of: a remote management and control protocol (RMCP) and a RMCP security extensions protocol (RSP) to enable remote management of systems using Web services in out-of-band (OOB) management devices.
摘要:
Provided are a method, system, and program for updating a cache in which, in one aspect of the description provided herein, changes to data structure entries in the cache are selectively written back to the source data structure table maintained in the host memory. In one embodiment, translation and protection table (TPT) contents of an identified cache entry are written to a source TPT in host memory as a function of an identified state transition of the cache entry in connection with a memory operation and the memory operation. Other embodiments are described and claimed.
摘要:
Provided are techniques for interrupt processing. An Input/Output device determines that an event has occurred. The Input/Output device determines a processor identifier and determines an event data structure identifier for an event data structure into which data for the event is stored using the processor identifier. The Input/Output device also determines a vector identifier for an interrupt message vector into which an interrupt message for the event is written. Then, interrupt message data is written to the interrupt message vector to generate an interrupt.
摘要:
A local manager in a local networking domain may configure a plurality of logical switches by combining switching functions available in network devices and/or network switches in the local networking domain. The configuration may utilize vertical and/or horizontal combinations of the switching functions. The switching functions may comprise network switch-based switching functions, and/or hypervisor-level switching functions and/or network adapter-level switching functions available in network devices which may be configured as virtualized platforms. The local manager may provide interfacing services to enable exposing configured logical switches. The interfacing services may comprise an internal interface, which may be utilized, via the local manager, to control the switching functions corresponding to logical switches and/or to route messages sent to and/or from the logical switches. The interfacing services may also comprise an external interface, which may be used by external entities, such as remote management entities, to manage and/or interact with configured logical switches.