摘要:
Methods and apparatus for detection and handling of virtual appliance failures. In one aspect, a method is implemented on a host platform on which a hypervisor (aka Virtual Machine Manager) and a plurality of virtual machines (VMs) are running, the plurality of VMs collectively hosting a plurality of Software Defined Networking (SDN) and/or Network Function Virtualization (NFV) appliances that are communicatively coupled via a virtual network. A software-based entity running on the host platform is configured to monitor the plurality of virtual network appliances to detect failures of the virtual network appliances. In response to detection of a virtual network appliance failure, messages containing configuration information are implemented to reconfigure packet flows to bypass the virtual network appliance that has failed.
摘要:
An apparatus may include a Serial General Purpose Input Output (SGPIO) initiator device. The SGPIO initiator device may have terminals to receive parallel input signals. The device may also have parallel-to-serial conversion logic to convert the parallel input signals to a serial stream. The device may further have signal ordering logic. The signal ordering logic may be in communication with the terminals and may be in communication with the parallel-to-serial conversion logic. The signal ordering logic may determine an order in which the parallel input signals are provided in the serial stream. Methods of ordering signals within an SGPIO initiator device and systems having SGPIO initiator devices are also disclosed.
摘要:
A process and system for virtually managing enclosures. A process determines whether a system includes an enclosure processor, a virtual enclosure processor, or both an enclosure processor and a virtual enclosure processor. The process receives a command by a virtual enclosure processor if it is determined that the system includes the virtual enclosure processor. The virtual enclosure processor manages a peripheral in an enclosure. Additionally, a process activates a virtual enclosure processor in a system including a real enclosure processor. The virtual enclosure processor receives a command. The virtual enclosure processor controls a peripheral.
摘要:
In one embodiment, a method is provided that may include determining, at least in part, at an intermediate station one or more locations in storage devices of one or more respective portions of check data and/or other data. The check data may be generated, at least in part, at the intermediate station based at least in part upon the other data. This method also may include determining, at least in part, at the intermediate station, based at least in part upon forwarding information, one or more ports of the intermediate station via which to forward one or more packets. The one or more packets may be generated at the intermediate station based at least in part upon one or more other packets received via one or more other ports of the intermediate station. The other packets may comprise the check data and/or other data.
摘要:
A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
A core of a network includes a storage unit to store a plurality of parameters to receive and transmit data packets in a communication system. A program controls transfer of the data packets between the core and a network node. The plurality of parameters in the storage unit controls the receiving and transmitting.
摘要:
Methods and apparatus for performing Direct Memory Access (DMA) transfers of sets of data and results of performing logical operations on the sets of data are disclosed. In one aspect, a method may include receiving a data structure that specifies DMA transfers of sets of data and a DMA transfer of a logical operation, such as an exclusive OR, on the sets of data. In response to receiving the data structure, the DMA transfers of the sets of data, and the DMA transfer of the logical operation performed on the sets of data may be performed.
摘要:
A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
In one embodiment, a method is provided. The method of this embodiment provides, in response to a data read request for requested data, allocating an area of memory to the requested data, where the memory area is divided into at least one memory chunk. A seed value is written to one or more of the at least one memory chunk. In response to the completion of at least one write transaction corresponding to the data read request, for each of the one or more memory chunks having a seed value, validating the integrity of the write transaction based, at least in part, on the seed value. Other embodiments are also described and claimed.
摘要:
In one embodiment, a method is provided that may include generating, at least in part, an identifier to be associated with a group of devices. The group of devices may comprise at least two devices. The identifier may be generated, at least in part, based, at least in part, upon respective source identifiers identifying, at least in part, respective sources of the at least two devices. Of course, many modifications, variations, and alternatives are possible without departing from this embodiment.