摘要:
A method of zoning a fabric-attached (SAS) storage network. For each target attached to an expander, the expander maintains a list of SAS addresses of initiator devices that are permitted access to that's ports target devices. Configuration and management of zones may be accomplished using a management application, such as those using the SMP command protocol.
摘要:
An SAS RAID adapter comprises an input-output processor (IOP) and at least two SAS input-output controllers (IOCs). Wherein SAS links coupled to each of the IOCs form “virtual ports” in order to increase performance and maintain availability. The virtual ports across the at least two IOCs have wide port SAS link capability so as to provide performance enhancements similar to a standard SAS wide port. Even if a single IOC failure occurs, downshifting to N/2 links is provided with degraded aggregated bandwidth (data throughput) instead of a failover and/or system shutdown.
摘要:
A system and method of managing power consumption of communication interfaces and attached devices is disclosed. In one form of the disclosure, a communication module can include a communication interface operable to receive link utilization information of a plurality of communication channels of the communication interface. The communication module can also include a processor operable to determine a percent utilization of the plurality of communication channels using the link utilization information. The processor can also be operable to initiate issuing a power management request of at least one of the plurality of communication channels in response to comparing the percentage of link utilization to a threshold level.
摘要:
A system for a host-based RAID solution in a shared storage environment is provided in which the compute blades of a system are coupled to one or multiple concentrators. The concentrators serve as a switch or expander to couple each of the compute blades to a shared storage resource. Within the shared storage resource, a set of drives is configured in a RAID array. The shared disk drives are partitioned so that each partition is dedicated to one of the compute blades of the system. Multiple sets of drives may be used so that the collective set of drives can be configured as part of a RAID volume that includes mirroring between at least two of the drives of the RAID volume, such as RAID 1 or RAID 0+1, in which each set of drives is a mirror of the other set of drives and the content associated with each of the compute blades is striped across multiple drives in each of the two sets of drives.
摘要:
A heterogeneous and scalable bridge capable of translating a plurality of network protocols is adapted for coupling to a network switch fabric. The bridge uses at least one egress buffer interface and can perform port aggregation and bandwidth matching for various different port standards. The bridge is adapted for both networking and storage area networking protocols. A control unit is implemented with the bridge is able to identify control and flow information from different protocols and adapt them to the respective interface to which they are to be transmitted. Accounting logic is provided to one or more of the elements of the apparatus to aid in the tracking, storing, and reporting of network traffic.
摘要:
A rotatable fan system and method is disclosed in which an array of paired fans is included as part of an information handling system. The array of paired fans can be rotated so that the interior fan becomes the exterior fan. The array includes an electrical switch for reversing the rotational direction of the blades of the paired fans following the rotation of the fan array.
摘要:
In some embodiments, a method for controlling a cache having a volatile memory and a non-volatile memory during a power up sequence is provided. The method includes receiving, at a controller configured to control the cache and a storage device associated with the cache, a signal indicating whether the non-volatile memory includes dirty data copied from the volatile memory to the non-volatile memory during a power down sequence, the dirty data including data that has not been stored in the storage device. In response to the received signal, the dirty data is restored from the non-volatile memory to the volatile memory, and flushed from the volatile memory to the storage device.
摘要:
In some embodiments, a method for controlling a cache having a volatile memory and a non-volatile memory during a power up sequence is provided. The method includes receiving, at a controller configured to control the cache and a storage device associated with the cache, a signal indicating whether the non-volatile memory includes dirty data copied from the volatile memory to the non-volatile memory during a power down sequence, the dirty data including data that has not been stored in the storage device. In response to the received signal, the dirty data is restored from the non-volatile memory to the volatile memory, and flushed from the volatile memory to the storage device.
摘要:
A method of zoning a fabric-attached (SAS) storage network. For each target attached to an expander, the expander maintains a list of SAS addresses of initiator devices that are permitted access to that's ports target devices. Configuration and management of zones may be accomplished using a management application, such as those using the SMP command protocol.
摘要:
A system and method of managing power consumption of communication interfaces and attached devices is disclosed. In one form of the disclosure, a communication module can include a communication interface operable to receive link utilization information of a plurality of communication channels of the communication interface. The communication module can also include a processor operable to determine a percent utilization of the plurality of communication channels using the link utilization information. The processor can also be operable to initiate issuing a power management request of at least one of the plurality of communication channels in response to comparing the percentage of link utilization to a threshold level.