摘要:
A method and system for allowing nodes in a multi-node computer to be appropriated by a master node in the multi-node computer. The node to be appropriated is suspended into an ACPI S3 Sleep State, causing current system operations state information to be stored in a backup memory in the appropriated node. The master node then populated a primary memory in the appropriated node with OS and other information required to join a partition that includes the master node. When the master node no longer wishes to use the appropriated node, the backup memory in the appropriated node is mirrored back into the primary memory. When the appropriated node “wakes up” from the S3 state, it continues executing software commands where it left off, without knowing anything that had happened after going into the S3 state.
摘要:
A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.
摘要:
A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software iSCSI HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.
摘要:
A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.
摘要:
A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software iSCSI HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.
摘要:
The system resources in a computer system having a multi-level, hierarchical bus structure are allocated by determining the address resource requirement of the devices and lower level PCI-PCI bridges, if any, subordinate to every higher level bridge by receiving address resource requirement information from each device and each lower level bridge, if any. Then, the address value of resource address requirement of the devices and lower level bridges requiring specific address allocation are sorted in an ascending order. Next, the size of resource address requirement of the devices and lower level bridges with non-specified address allocation is sorted in an descending order. Finally, the sorted list is grouped by an first fit algorithm to determine the resource allocation for each device within the bus hierarchy.
摘要:
An apparatus, system, and method are disclosed for distributing configuration parameters. The present invention includes one or more storage devices configured to store data, a first DHCP server configured to process DHCP messages and redirect communications regarding configuration parameters for the storage devices to a second DHCP server, and a configuration datastore configured to store configuration parameters for the storage devices. The second DHCP server may be configured to process DHCP messages and retrieve configuration parameters for the storage devices from the configuration datastore. In certain embodiments, each storage initiator communicates with the DHCP servers, receives the configuration parameters such as iSCSI parameters, and provides the configuration parameters to one or more storage devices.
摘要:
An apparatus, system, and method are disclosed for automatically verifying access to a multipathed target at boot time. The apparatus is provided with a logic unit containing a plurality of modules configured to functionally execute the necessary steps of identifying a plurality of paths to a target device, automatically selecting one of the plurality of paths to the target device, and verifying access on at least one path to the target device. Beneficially, the disclosed embodiments of the apparatus, system, and method reduce false errors during the boot cycle, improve reliability of the multipathed network, simplify traffic load balancing, and provide for topology mapping for troubleshooting and network metrics. The disclosed embodiments provide a means for verifying multipathed targets automatically, without requiring user assistance, intervention, or interaction.
摘要:
An apparatus, system, and method are disclosed for deploying sensitive communication parameters to a diskless computing device. A parameter structure module is included to store one or more Internet Small Computer System Interface (“iSCSI”) communication parameters in an extendable data structure configured to store a set of basic parameter settings and a set of extended parameter settings. A link module is included to establish a secure link to a diskless computing device over a physically secure connection. A deployment module is included to deploy the extendable data structure over the secure connection to a non-volatile memory in the diskless computing device. The non-volatile memory is configured to provide sensitive iSCSI communication parameters provided by the extendable data structure to a CPU of the diskless computing device during a boot sequence.
摘要:
Provides management tools for a System Owner to assure that a personal computer system is secured against access by an unauthorized user by foreclosing the possibility of circumventing system's security protection during an I/O ROM scan. The POST code is designed to prompt for the proper security password prior to allowing any adapter ROM utility to be run. An interrupt service routine will detect key strokes during adapter ROM scan and prior to passing control to the adapter ROM for handling of the keyboard interrupt. Prior to the ROM Scan for the system, the POST code detects whether or not C2 Security is enabled. On some systems, the C2 functionally may not be used and, the system does not consider password protection for the adapter Utilities. If however, the C2 functionality of the system is enabled, the POST code will continue to enable the password protection for the ROM Scan. Once the interrupt service routine is established the ROM scan will begin. Once the ROM Scan is complete, the interrupt service routine will be unchained from the system, and progress will continue through POST.