摘要:
In one embodiment, a method may include, if an amount of data requested to be transferred by a data transfer request according to a first protocol exceeds a maximum data transfer amount permitted to be requested by a single data transfer request according to a second protocol, generating one data transfer request according to the second protocol and a data structure, and modifying, at least in part, another data structure. This data transfer request may request transfer of a portion of the data. The data structure may include one or more values identifying, at least in part, another portion of the data. The modifying may be based, at least in part, upon the one or more values. The other data structure may include, prior to being modified, one or more other values indicating, at least in part, one or more parameters of the one data transfer request.
摘要:
One embodiment of a method may include, in response, at least in part, to one or more received frames, generating an interrupt and preventing transmission of one or more other frames. The one or more received frames may indicate, at least in part, an error condition or a commencement of a data transfer. The method of this embodiment also may include, in response, at least in part, to the interrupt, executing one or more instructions. The one or more instructions, when executed, may optionally result in deleting the one or more other frames, and if the one or more received frames indicate, at least in part, the error condition, commencing recovery from the error condition. If the one or more received frames indicate, at least in part, the commencement of the data transfer, the method of the embodiment may include storing data associated with the data transfer.
摘要:
A method and apparatus to guarantee unique connection tags across resets in a connection protocol. In one embodiment, the methods include the update of a reset counter following a system reset. In one embodiment, once updated, a controller, such as, for example, an input/output (I/O) controller, may receive a response from a target device to an I/O request that was issued to the target device prior to system reset. In one embodiment, the I/O controller may determine a reset counter value associated with the received response. If the received response includes a reset counter value that does not match a local reset counter held by the I/O controller, the I/O controller may disregard the received response. Other embodiments are described and claimed.
摘要:
A core of a network includes a storage unit to store a plurality of parameters to receive and transmit data packets in a communication system. A program controls transfer of the data packets between the core and a network node. The plurality of parameters in the storage unit controls the receiving and transmitting.
摘要:
In one embodiment, if the amount of data requested by a data transfer request according to a first protocol exceeds a maximum permitted for a single data transfer request according to a second protocol, a data structure and one data transfer request according to the second protocol may be generated. The request may request a portion of the data. If a target of the request is capable of receiving, prior to completion of performance of the request, another data transfer request according to the second protocol, the another data transfer request may be generated, based upon the at least one value, and the data structure may be modified. The another data transfer request may request at least some of the another portion of the data. The data structure, as modified, may comprise at least one value indicating that the target has not completed performing the another data transfer request.
摘要:
A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
In one embodiment, a method may include, if an amount of data requested to be transferred by a data transfer request according to a first protocol exceeds a maximum data transfer amount permitted to be requested by a single data transfer request according to a second protocol, generating one data transfer request according to the second protocol and a data structure, and modifying, at least in part, another data structure. This data transfer request may request transfer of a portion of the data. The data structure may include one or more values identifying, at least in part, another portion of the data. The modifying may be based, at least in part, upon the one or more values. The other data structure may include, prior to being modified, one or more other values indicating, at least in part, one or more parameters of the one data transfer request.
摘要:
A method according to one embodiment may include communicating, by an integrated circuit, with at least one target ATA/ATAPI storage device. The method of this embodiment may also include creating, by the integrated circuit, a persistent reservation between at least one target ATA/ATAPI storage device and the integrated circuit. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
Provided are a method, system, and program for processing a transmission from a first device to a second device. An identification transmission is received including an interface address from the first device. A determination is made as to whether the identification transmission indicates a recognized vendor identifier. An interface address of a third device is returned to the first device in response to determining that the identification transmission includes one recognized vendor identifier, wherein the third device relays transmissions between the first and second devices.
摘要:
A method according to one embodiment may include communicating, by an expander device, with at least one initiator engine using at least a first communication protocol and at least one target storage device using at least a second communication protocol. The method of this embodiment may also include translating, by the expander device, between first commands transmitted using the first communication protocol and second commands transmitted using the second communication protocol. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.