会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHODS AND SYSTEMS FOR ACCESSING HOST MEMORY THROUGH NON-VOLATILE MEMORY OVER FABRIC BRIDGING WITH DIRECT TARGET ACCESS
    • 用直接目标访问通过织物桥接通过非易失性存储器访问寄存器的方法和系统
    • WO2017176775A1
    • 2017-10-12
    • PCT/US2017/025970
    • 2017-04-04
    • MARVELL WORLD TRADE LTD.JOSHUA, EitanFUREY, ScottMELTS, DimitryMIZRAHI, Noam
    • JOSHUA, EitanFUREY, ScottMELTS, DimitryMIZRAHI, Noam
    • G06F13/28G06F3/06H04L29/06
    • Embodiments described herein provide a method for accessing a host memory through non-volatile memory over fabric bridging with direct target access. A first memory access command encapsulated in a first network packet is received at a memory interface unit and from a remote direct memory access (RDMA) interface and via a network fabric. The first memory access command is compliant with a first non-volatile memory interface protocol and the first network packet is compliant with a second non-volatile memory interface protocol. The first network packet is unwrapped to obtain the first memory access command. The first memory access command is stored in a work queue using address bits of the work queue as a pre-set index of the first memory access command. The first memory access command is sent from the work queue based on the pre-set index to activate a first target storage device.
    • 这里描述的实施例提供了一种用于通过具有直接目标访问的结构桥接通过非易失性存储器访问主机存储器的方法。 封装在第一网络分组中的第一存储器访问命令在存储器接口单元处并从远程直接存储器存取(RDMA)接口并经由网络结构被接收。 第一存储器访问命令符合第一非易失性存储器接口协议,并且第一网络分组符合第二非易失性存储器接口协议。 解开第一个网络数据包以获得第一个存储器访问命令。 第一存储器访问命令存储在使用工作队列的地址位作为第一存储器访问命令的预置索引的工作队列中。 第一个存储器访问命令是基于预置索引从工作队列发送的,以激活第一个目标存储设备。
    • 3. 发明申请
    • TUNNELING TRANSACTION PACKETS
    • TUNNELING交易包
    • WO2014169010A1
    • 2014-10-16
    • PCT/US2014/033438
    • 2014-04-09
    • MARVELL WORLD TRADE LTD.
    • GEDDES, DavidFUREY, ScottCAO, Joseph, Jun
    • G06F13/38
    • G06F13/122G06F13/385G06F13/426
    • The present disclosure describes apparatuses and techniques for tunneling transaction packets. In some aspects a packet is received from a peripheral device via a first data interface of a device. The packet includes an address for resource access and an identifier that identifies the peripheral device or a function thereof. Based on this identifier, it is determined whether the peripheral device is attempting to access an internal resource of the device or a resource of a host device connected to a second data interface of the device. If the peripheral device is attempting to access the resource of the host device, the packet is routed to the host device via the second data interface without modifying the address for resource access. By so doing, the peripheral device can exchange data with the host device without using address translation.
    • 本公开描述了用于隧道传送交易分组的装置和技术。 在一些方面,经由设备的第一数据接口从外围设备接收分组。 分组包括用于资源访问的地址和标识外围设备的标识符或其功能。 基于该标识符,确定外围设备是否尝试访问设备的内部资源或连接到设备的第二数据接口的主机设备的资源。 如果外围设备尝试访问主机设备的资源,则该分组经由第二数据接口路由到主机设备,而不修改用于资源访问的地址。 通过这样做,外围设备可以与主机设备交换数据而不使用地址转换。