摘要:
A core of a network includes a storage unit to store a plurality of parameters to receive and transmit data packets in a communication system. A program controls transfer of the data packets between the core and a network node. The plurality of parameters in the storage unit controls the receiving and transmitting.
摘要:
A method and apparatus to guarantee unique connection tags across resets in a connection protocol. In one embodiment, the methods include the update of a reset counter following a system reset. In one embodiment, once updated, a controller, such as, for example, an input/output (I/O) controller, may receive a response from a target device to an I/O request that was issued to the target device prior to system reset. In one embodiment, the I/O controller may determine a reset counter value associated with the received response. If the received response includes a reset counter value that does not match a local reset counter held by the I/O controller, the I/O controller may disregard the received response. Other embodiments are described and claimed.
摘要:
A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
In one embodiment, a method may include, if an amount of data requested to be transferred by a data transfer request according to a first protocol exceeds a maximum data transfer amount permitted to be requested by a single data transfer request according to a second protocol, generating one data transfer request according to the second protocol and a data structure, and modifying, at least in part, another data structure. This data transfer request may request transfer of a portion of the data. The data structure may include one or more values identifying, at least in part, another portion of the data. The modifying may be based, at least in part, upon the one or more values. The other data structure may include, prior to being modified, one or more other values indicating, at least in part, one or more parameters of the one data transfer request.
摘要:
One embodiment of a method may include, in response, at least in part, to one or more received frames, generating an interrupt and preventing transmission of one or more other frames. The one or more received frames may indicate, at least in part, an error condition or a commencement of a data transfer. The method of this embodiment also may include, in response, at least in part, to the interrupt, executing one or more instructions. The one or more instructions, when executed, may optionally result in deleting the one or more other frames, and if the one or more received frames indicate, at least in part, the error condition, commencing recovery from the error condition. If the one or more received frames indicate, at least in part, the commencement of the data transfer, the method of the embodiment may include storing data associated with the data transfer.
摘要:
In one embodiment, if the amount of data requested by a data transfer request according to a first protocol exceeds a maximum permitted for a single data transfer request according to a second protocol, a data structure and one data transfer request according to the second protocol may be generated. The request may request a portion of the data. If a target of the request is capable of receiving, prior to completion of performance of the request, another data transfer request according to the second protocol, the another data transfer request may be generated, based upon the at least one value, and the data structure may be modified. The another data transfer request may request at least some of the another portion of the data. The data structure, as modified, may comprise at least one value indicating that the target has not completed performing the another data transfer request.
摘要:
In one embodiment, a method may include, if an amount of data requested to be transferred by a data transfer request according to a first protocol exceeds a maximum data transfer amount permitted to be requested by a single data transfer request according to a second protocol, generating one data transfer request according to the second protocol and a data structure, and modifying, at least in part, another data structure. This data transfer request may request transfer of a portion of the data. The data structure may include one or more values identifying, at least in part, another portion of the data. The modifying may be based, at least in part, upon the one or more values. The other data structure may include, prior to being modified, one or more other values indicating, at least in part, one or more parameters of the one data transfer request.
摘要:
A method according to one embodiment may include generating, by copy manager circuitry comprised in an integrated circuit, one or more copy commands to copy data from a first mass storage device to a second mass storage device via the integrated circuit. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.