摘要:
In a mobile satellite system, a system for providing satellite communication between multiple users in a closed user group arrangement includes first and second mobile earth terminals (METs) responsively connecter to and registering with the mobile satellite system. The first MET selects a closed user group network identifier (NET. ID) representing a NET group including the first and second METs to establish voice communication therewith and transmits the NET ID to a central controller. The central controller receives the NET ID from the first MET, validates the first MET for communication, validates the NET ID, allocates a frequency for the NET group, and broadcasts the message to the NET group including the second MET informing the NET group of the allocated frequency and the voice communication associated therewith. The second MET tunes to the frequency in response to the message broadcast by the central controller, and the central controller assigns the first MET as current speaker for the NET group.
摘要:
An apparatus may include a Serial General Purpose Input Output (SGPIO) initiator device. The SGPIO initiator device may have terminals to receive parallel input signals. The device may also have parallel-to-serial conversion logic to convert the parallel input signals to a serial stream. The device may further have signal ordering logic. The signal ordering logic may be in communication with the terminals and may be in communication with the parallel-to-serial conversion logic. The signal ordering logic may determine an order in which the parallel input signals are provided in the serial stream. Methods of ordering signals within an SGPIO initiator device and systems having SGPIO initiator devices are also disclosed.
摘要:
A process and system for virtually managing enclosures. A process determines whether a system includes an enclosure processor, a virtual enclosure processor, or both an enclosure processor and a virtual enclosure processor. The process receives a command by a virtual enclosure processor if it is determined that the system includes the virtual enclosure processor. The virtual enclosure processor manages a peripheral in an enclosure. Additionally, a process activates a virtual enclosure processor in a system including a real enclosure processor. The virtual enclosure processor receives a command. The virtual enclosure processor controls a peripheral.
摘要:
In one embodiment, a method is provided that may include determining, at least in part, at an intermediate station one or more locations in storage devices of one or more respective portions of check data and/or other data. The check data may be generated, at least in part, at the intermediate station based at least in part upon the other data. This method also may include determining, at least in part, at the intermediate station, based at least in part upon forwarding information, one or more ports of the intermediate station via which to forward one or more packets. The one or more packets may be generated at the intermediate station based at least in part upon one or more other packets received via one or more other ports of the intermediate station. The other packets may comprise the check data and/or other data.
摘要:
Methods and apparatus for detection and handling of virtual appliance failures. In one aspect, a method is implemented on a host platform on which a hypervisor (aka Virtual Machine Manager) and a plurality of virtual machines (VMs) are running, the plurality of VMs collectively hosting a plurality of Software Defined Networking (SDN) and/or Network Function Virtualization (NFV) appliances that are communicatively coupled via a virtual network. A software-based entity running on the host platform is configured to monitor the plurality of virtual network appliances to detect failures of the virtual network appliances. In response to detection of a virtual network appliance failure, messages containing configuration information are implemented to reconfigure packet flows to bypass the virtual network appliance that has failed.
摘要:
A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
A core of a network includes a storage unit to store a plurality of parameters to receive and transmit data packets in a communication system. A program controls transfer of the data packets between the core and a network node. The plurality of parameters in the storage unit controls the receiving and transmitting.
摘要:
Methods and apparatus for performing Direct Memory Access (DMA) transfers of sets of data and results of performing logical operations on the sets of data are disclosed. In one aspect, a method may include receiving a data structure that specifies DMA transfers of sets of data and a DMA transfer of a logical operation, such as an exclusive OR, on the sets of data. In response to receiving the data structure, the DMA transfers of the sets of data, and the DMA transfer of the logical operation performed on the sets of data may be performed.
摘要:
A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
In one embodiment, a method is provided. The method of this embodiment provides, in response to a data read request for requested data, allocating an area of memory to the requested data, where the memory area is divided into at least one memory chunk. A seed value is written to one or more of the at least one memory chunk. In response to the completion of at least one write transaction corresponding to the data read request, for each of the one or more memory chunks having a seed value, validating the integrity of the write transaction based, at least in part, on the seed value. Other embodiments are also described and claimed.