Embodiments of the invention relate generally to a reliability technique using bus re-routing and failover mechanism in a bus system particularly comprising of a plurality of bus masters and slave devices connected using a common bus.
The background description provided herein is for the purpose of generally presenting the context of the disclosure of the invention. Work of the presently named inventors, to the extent the work is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against this present disclosure of the invention.
It is widely recognized that as the computer system networks continue to grow, so also do the demands for performance, adaptability, reliability and high availability. Conventional computer system has the ability to support fully redundant architecture and failover.
Common implementation of a redundant architecture and failover mechanism is applied in a system level architecture of computer systems, where redundant components are usually managed by software that provides fault detection and correction procedures to maximize availability of the critical services and application provided by that system. An example of a system level implementation of redundant architecture is in an IP network that provides failover mechanism when a router fails or when links between hosts and clients fail. In response to this, designers developed several methods and as well as improvements to provide failover features. Basically in a network, the failover process involves a brief interruption in services. The failover recognition and failover process is then triggered to initialize the services on a backup server. This process occurs automatically without human intervention.
Board level or chip level architecture involves also the use of Redundant Array of Independent Disks (RAID) and has become commonplace in serving storage environments. The RAID system is an external device that is usually connected between two or more servers managed by a RAID controller. To ensure reliability with the system, a failover mechanism is implemented.
Mainly, a failover mechanism is a method of how the system operates in a board level or chip level architecture in the event when one or more or the controllers that manages internal/external devices, mirrored devices or other memory devices fails in a system implemented on applied specific integrated circuits (ASIC).
One example of a failover method is described, in example, U.S. Pat. No. 6,578,158 B1 to Dietz et al, which uses a fibre channel arbitrated loop to provide failover and failback mechanism for failed controllers. The method includes disabling the failed controller and instructing the surviving controller to assume the identity of the failed component.
Loops are used to connect a host computer to controller and controller to the RAID system. Though the invention is efficient, unfortunately it is limited to certain prospects: (1) the invention focuses on the failure of the RAID controller component and does not include the failure of a loop or path connections (2) the invention is specific for RAID devices (3) lastly, it is limited to fibre channel loops.
Moreover, described in U.S. Pat. No. 6,681,339 B1 to McKean et al, to circumvent failover, a dual-controller mechanism is used to provide redundancy. The first and secondary controller are coupled to one another so that in the event of a controller failure, the surviving controller will takeover the task performed by the failed controller.
Though the above commonly-owned and commonly-assigned patents provide a solution to certain failover problems, it only provides an answer to one certain failure and that is the failure of a controller component. It does not provide a solution to the case wherein a link in the computer system fails. The case between the failure of a component and the failure of a link or path is different.
When a controller component fails in a system, host or other components attached to it is rendered as unusable unless a redundant path is prepared to redirect all the signals of a certain host to a secondary controller component. These are the scenarios provided in the mentioned patents. On the other hand, when a link or a path fails between a controller component and a storage device, the host or components attached to the controller component are still considered operational. Certain methods can be used to do so, for example, the controller component which these devices are attached can perform the role of a router to select available paths to allow communication between the host and the storage devices.
The second case of failover is best described using U.S. Pat. No. 5,822,251 to Bruce et al, to hereby consider as reference. In the invention, controller component is implemented on an applied specific integrated circuit (ASIC) wherein a dual flash specific DMA controller is used to control expandable flash memory devices. The connection is achieved using flash bus “buddy lines” to allow the DMA controller to perform flash commands and data transfer from the controller chip and the flash memory module. Though the patent provides flash bus “buddy lines” as its mechanism for redundancy, unfortunately it does not consider the probability of a flash bus failure.
Unfortunately, the method is limited to usage of a fibre channel arbitrated loop architecture.
An embodiment of the present invention features a technique for robustness and availability of a storage system by providing a method of bus routing and failover mechanism to bus arbiters comprising the system. More specifically, an embodiment of the present invention offers a set of techniques for providing failover and routing of long running connections across a distributed collection of bus masters and slave devices and is useful for fault-tolerant and load-balanced distribution of data, control and command signals.
In one embodiment of the invention, a system architecture for bus masters and bus arbiters are provided to support routing and failover. The system comprises large pools of bus masters, a plurality of sets can be configured to control a plurality of slave devices wherein each set contains a collection of bus masters attached to a central arbiter driving one of the system buses. Each set controls a group(s) of slave devices that are primarily controlled by the bus master(s) within the set. Hence, a system can therefore include a plurality of sets and can control a group of slave devices. In the system, arbiters do not only perform the duty of bus arbitration but they also serve as the health monitoring device wherein they constantly monitor the condition of the bus attached to them and are capable of generating a status signal enabling the system to operate in a routing or failover mode. Each arbiter is assigned to a bus and is provided by a bus identification code. To promote flexibility in the system, an arbiter priority selector is provided wherein when the routing or failover mode is enabled, the selector decides which bus is to be utilized or re-used.
According to one embodiment of the present invention, in the event of a bus failure, the arbiter connected to that failed bus sends a status signal to the arbiter priority select enabling the selection among the surviving bus to which the bus masters from the disabled bus can access. The data, commands and control signals of the bus masters from the disabled bus that is allowed to perform bus transaction in a secondary bus is migrated to the secondary arbiter. This ability can allow bus masters from the disabled bus to continue bus transaction in the event of a bus failure.
In another embodiment of the present invention, in the event that a bus is idle or left unused due to inactive bus master, the arbiter connected to the idle bus can accept external request from other arbiters to re-route data, commands and control signals. In the event of long-running bus transaction, a certain arbiter can possibly be congested of bus request from a plurality of bus masters in which it is connected. Detecting the congestion, the arbiter sends a status signal to the arbiter priority select enabling the routing mode of the system. In this case, the arbiter priority select chooses among the idle bus(es) to which it can use to re-route other requests and bus transactions.
In another embodiment of the invention, a system architecture for bus masters and bus arbiters are provided to support routing and failover. A CPU or an arbiter priority select determines re-routing or failover between buses. Point-to-point flashbus topology may be used to connect the components in the system architecture. The system comprises large pools of bus masters, a plurality of sets can be configured to control a plurality of slave devices wherein each set contains a collection of bus masters attached to central arbiter driving one of the system buses. Each set controls a group(s) of slave device that are primarily controlled by the bus master(s) within the set. Hence, a system can, therefore, include of a plurality of sets and can control a group of slave devices.
In an embodiment of the invention, an apparatus comprises: a plurality of bus masters and a plurality of bus arbiters to support routing and failover, wherein each bus arbiter is coupled to a plurality of bus masters; and a central processing unit (CPU) coupled to at least one of the bus arbiters; wherein the CPU is configured to execute a firmware that chooses bus re-routing or failover in response to a bus failure.
In another embodiment of the invention, a method comprises: choosing, by a central processing unit (CPU) coupled to a plurality of bus arbiters, bus re-routing or failover in response to a bus failure.
In yet another embodiment of the invention, an article of manufacture, comprises a non-transient computer-readable medium having stored thereon instructions that permit a method comprising: choosing, by a central processing unit (CPU) coupled to a plurality of bus arbiters, bus re-routing or failover in response to a bus failure.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one (several) embodiment(s) of the invention and together with the description, serve to explain the principles of the invention.
Non-limiting and non-exhaustive embodiments of the present invention are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified.
It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the present invention may admit to other equally effective embodiments.
In the following detailed description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of the various embodiments of the present invention. Those of ordinary skill in the art will realize that these various embodiments of the present invention are illustrative only and are not intended to be limiting in any way. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure.
In addition, for clarity purposes, not all of the routine features of the embodiments described herein are shown or described. One of ordinary skill in the art would readily appreciate that in the development of any such actual implementation, numerous implementation-specific decisions may be required to achieve specific design objectives. These design objectives will vary from one implementation to another and from one developer to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine engineering undertaking for those of ordinary skill in the art having the benefit of this disclosure. The various embodiments disclosed herein are not intended to limit the scope and spirit of the herein disclosure.
Exemplary embodiments for carrying out the principles of the present invention are described herein with reference to the drawings. However, the present invention is not limited to the specifically described and illustrated embodiments. A person skilled in the art will appreciate that many other embodiments are possible without deviating from the basic concept of the invention. Therefore, the principles of the present invention extend to any work that falls within the scope of the appended claims.
As used herein, the terms “a” and “an” herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced items.
In the following description and in the claims, the terms “include” and “comprise” are used in an open-ended fashion, and thus should be interpreted to mean “include, but not limited to . . . ”. Also, the term “couple” (or “coupled”) is intended to mean either an indirect or direct electrical connection (or an indirect or direct optical connection). Accordingly, if one device is coupled to another device, then that connection may be through a direct electrical (or optical) connection, or through an indirect electrical (or optical) connection via other devices and/or other connections.
The present invention provides a system 100 with large pool of bus masters (101, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136 and 137) from which a subset may be selected and configured to form a cluster of bus masters that controls a group of slave devices (109, 110, 111 and 112) through the system buses (114, 119, 120 and 121). The architecture can be specifically arranged in a progressive expansion wherein a plurality of sets can be formed containing 0 to n−1 number of bus masters. Bus masters 101, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136 and 137 together with their respective arbiters are preferably contained in a single Application Specific Integrated Circuit (ASIC).
As shown in
Under certain embodiment of the present invention, a plurality of subsets (113, 116, 117 and 118) can be formed in the system 100. For ease of description, system 100 is describe as including but not limited to the following: set 113 comprising of bus masters 101, 127 and 128 attached to bus 114 through a single arbiter 105; set 116 comprising of bus masters 129, 130 and 131 attached to bus 119 through a single arbiter 106; set 117 comprising of bus masters 132, 133 and 134 attached to bus 120 through a single arbiter 107 and set 118 comprising of bus masters 135, 136 and 137 attached to bus 121 through a single arbiter 108. The number of the mention components in the drawing (bus masters, slaves, arbiters, and slave controllers) are just for discussion purposes, the invention is not limited to these numbers.
To support bus routing and failure, an arbiter priority select 138 is provided in the system 100. The sets 113, 116, 117 and 118 are attached to the arbiter priority select 138 by their respective bus arbiters 105, 106, 107 and 108. Arbiters 105, 106, 107 and 108 uses a messaging link 125 to communicate to the arbiter priority select 138 in the event of the bus routing and bus failure. The messaging link 125 can be, but not limited to, a control or data signal. With the arbiter priority select 138, arbiters (105, 106, 107 and 108) in the system 100 can communicate with each other. The arbiter priority select 138 can be implemented with any or a combination of the following technologies: a state machine, logic circuits(s) having an appropriate combination of logic gates, etc.
Under certain embodiment of the present invention, once configured the arbiter priority select 138 can manage at least two sets (113, 116, 117 and 118) in the event of bus re-routing and failover. This will allow a minimum of two arbiters (105, 106, 107 and 108) to exchange information when routing and bus failure is performed. For example, in the event that bus 119 fails to perform data transfer from a set 116 of bus masters 129, 130 or 131, arbiter 106 sends information to arbiter priority select 138 that the bus 119 is no longer functioning. Arbiter priority select 138 then selects among the available buses (114, 120 or 121) of which it can allow a bus master from set 116 to gain bus access among the surviving buses. Arbiter priority select 138 will send a priority signal through the messaging link 125 to the surviving arbiters (105, 107 or 108) when it selects a bus (114, 120 or 121) of which the bus master from set 116 can access. With this configuration, the bus (114, 119, 120 or 121) owned by the sets (113, 116, 117 or 118) can be made into a shared bus.
The present invention is not limited to the event of a bus failure, it also supports a routing and redundancy mechanism for controls and data transfers in cases of unused, idle or inactive buses. For example, if bus master 131 is having a long transaction with bus 119, and at the same time bus master 129 is requesting access to bus 119 but bus 114 is not busy. Arbiter 106 signals arbiter priority select 138 that it wishes to utilize bus 114. This is an indication to arbiter 105 to accommodate bus master 129's request using message link 125. Arbiter 105 takes over arbiter 106's role in connecting bus master 129 to a slave controller connected to the requested slave.
The slaves 109, 110, 111 and 112 in the system 100 can be expanded by adding several slave controllers 122, 123 and 124. The figure shown shows an example of how the slave controllers 115, 122, 123 and 124 are attached to the bus 114, 119, 120, and 121. Bus 126 is a distributed version of bus 114 wherein the arbiter 105 is connected to the slave controllers 115, 122, 123, and 124. Same implementation is applied for the rest of the arbiters 106, 107 and 108 in the system 100.
It was previously mentioned, that under the embodiment of the present invention, the number of sets is configurable to contain a plurality of bus masters. In the same manner a preferable configuration is that at least two arbiters are attached to an arbiter priority select 229.
The figure highlights the interconnectivity of the dual sets (200 and 204) to the arbiter (210 and 211) and link between arbiters 210 and 211 of each set. The figure also highlights the redundant paths established by the bus masters from set 200 and 204 for routing and failover support. For the purpose of this discussion two groups of slaves are also included.
Slave devices 230 are owned by the bus masters from set 200. In the light of this, the slaves 230 can receive data, command and control signals from any of the bus masters from set 200 that is in control of the bus 208. With the same implementation as mentioned above, slaves 231 are owned by the bus masters from 204. Therefore slaves 231 can receive data, command and control signals from any of the bus masters from set 204 that is in control of the bus 209. The slave controller 232 is directly connected to the bus 208 and 209 and it receives and translates any command and control signals from the bus masters of set 200 and 204 into slave specific commands and control signals.
As shown in the figure, a plurality of bus masters in set 200 and set 204 may be interconnected to a common unitary bus 208 and 209 via bus arbiters 210 and 211 respectively. Requests 212, 213 and 214 represents the bus arbitration request signal from bus masters 201, 202 and 203 respectively. In the same manner, request 215, 216 and 217 represents the bus arbitration request signal from bus masters 205, 206 and 207. The arbitration request signal indicates the type of transaction the bus masters wants to perform. The transaction can either be a data bus transfer or command/control bus transfer. Bus arbiters 210 and 211 perform multi-level priority arbitration among bus masters from block 200 and 204. Grant 218, 219 and 220 are bus grant signals from the arbiter 210 to the bus masters 201, 202 and 203 respectively indicating that the bus master can access the bus 208. Only one bus master from set 200 can access the bus 208 at a time. Similarly for arbiter 211, it outputs grants 221, 222 and 223 as bus grant signals for bus masters 205, 206 and 207 respectively, indicating that the bus master can access the bus 209. Only one bus master from 204 can access the bus 209 at a time.
Request signals from the bus masters of block 200 and block 204 are solely for their corresponding arbiters, 210 and 211 respectively. Request signals from block 200 are dedicated to arbiter 210 while request signals from block 204 are dedicated for arbiter 211.
Unlike the request and grant signals, data and controls/command paths are distributed among the arbiters 210 and 211. Data and control paths 224, 225 and 226 are the primary/default paths for data and control/command signals from bus masters 201, 202 and 203 respectively. This primary/default path for the bus masters from set 200 is connected to the arbiter 210 and is used during bus transaction when any of the bus masters from set 200 sends data, commands and controls to the slaves 230 via bus 208. Aside from the primary/default path that the bus masters from set 200 establish with arbiter 210, a secondary path is also established by these bus masters from set 200 to the arbiter 211. The paths 227 connect bus masters 201, 202 and 203 to arbiter 211. This connection is a secondary/alternative path for data and control signals of the bus masters in set 200 in the event when bus 208 fails to function or when arbiter 210 performs re-routing.
The corresponding set-up is analogous to the operation of bus masters in block 204 wherein the data and controls paths contain a primary/default path (235, 236 and 237) and secondary/alternative path 234. These paths are utilized both for routing and failover mechanism. With the secondary paths 234 and 227 performance and reliability is enhanced. Bus masters from set 200 and 204 can perform bus transaction to bus 208 and 209 providing a fault tolerant bus transaction.
During the process of arbitration in the event of re-routing and failover, the arbiter 210 and 211 communicates. With the presence of arbiter priority select 229 the messaging link 228 between the two is established. This messaging link 228 can be, but not limited to, a custom messaging exchange protocol, control signals etc. These signals comprising the messaging link 228 are used by the arbiter priority select to monitor the health of buses (208 and 209).
In the event of re-routing and failover, coupled with the data, command and control signals, bus masters from each set 200 and 204 transmit a bus identification code. This identification code represents the bus to which the destined slave is located. For example, bus 209 fails to function, and that a bus master from set 204 is allowed to access the bus 208. Knowing that the set 204 uses a secondary path 234, and that it does not directly owned the bus 208 but only utilizes it due to its bus failure, that bus master from set 204 sends a bus identification code indicating that the data, command and control signal it transmit via bus 208 is intended for slave devices 231 and not for slave devices 230. This bus identification code is received by the slave controller 232 and selects the appropriate slave destination.
With the architecture and configuration in system 233, the process of failover mechanism is described in detailed wherein: bus masters 301, 302 and 303 from set 300 are actively participating in bus arbitration to transfer data to slave devices 330, bus masters 305 and 306 from set 304 are actively participating in bus arbitration to transfer data to slave devices 331 and bus 312 is detected as malfunctioning.
Arbiter 308 receives the request signals 313, 314 and 315 from the bus masters 301, 302 and 303; concurrently it sends a status signal to the arbiter priority select 328 of the health of bus 311. This status signal 310 informs the arbiter priority select 328 whether the bus 311 is currently functioning or damaged. For this example, bus 311 is in good condition, indicating that the arbiter 308 can grant a bus master with the highest priority from set 300 of bus access and allow transfer of data, command and control signals to the slave devices 329.
At this moment in time, arbiter 309 is receiving request signals 316 and 317 from bus masters 305 and 306 respectively from set 304 requesting for bus access in bus 312. Bus master 307 is shown not participating in the bus arbitration. Detecting that bus 312 is not functioning, arbiter 309 sends a status signal 310 to the arbiter priority select 328 of the health of the bus 312 indicating that it can not perform data transfer.
With the failover mechanism taking place, arbiter 309 still performs arbitration among bus master 305 and 306. In the event where the arbiter 309 has selected a bus master with the highest priority, it sends a busrequest signal 321 to the arbiter 308. The busrequest signal is an indication to the arbiter 308 that a bus master with highest priority from set 304 is requesting to use bus 311. At the same time, arbiter 308 has selected a bus master with highest priority from set 300. With two bus masters determined as high priority, arbiter 308 is handling two high priority requests for bus 311 from both set 300 and 304.
In some embodiment of the present invention, the one of the major function of the arbiter priority select 308 is to choose which high priority request from each set will be serviced first. For this example, since bus 311 is in good condition and that it is primarily owned by set 300, bus master with the highest priority from set 300 will be selected first. Therefore the priority signal 322 of the arbiter priority select will point to arbiter 308 granting the bus master from set 300. Arbiter 308 sends a grant signal 318 to the winning bus master 303. Upon receiving the grant signal 318, the bus master 303 starts to transfer command, control and data information to the target slave device 329 using the primary path 319. Path 320 is disregarded.
Upon completing the bus transaction, the priority signal 322 which previously points to arbiter 308 will point to the busrequest signal 321 from arbiter 309 granting the bus master with the highest priority from set 304. Arbiter 308 will send the busgrant signal 323 indicating that it accepts the requests and will administer the data transfer from set 304. The bus master 305 being the highest priority from set 304 receives a grant signal 324 from arbiter 309. This grant signal 324 is just a reflected busgrant signal 323 from arbiter 308. The bus master 305 then uses the secondary path 326 to transmit command, control and data information in slave device 330 via bus 311. The priority select signal 322 will then shift its priority after a bus transaction has completed. In some embodiment of the present invention, should there be a plurality of sets connected to the arbiter priority select 328 via the arbiters, the priority signal 322 will point to the bus arbiter that can readily service the busrequest signal 321 from the other sets.
In some embodiment of the present invention the bus identification code is sent together with the control signals indicating the exact bus location of the target slave device. In this example, the bus identification code sent by the bus master 305 from set 304 is directed to the exact location of the slave device 330.
The slave controller 331 will receiving this bus identification code from bus 311 and determines that the command, control and data information is intended for slave device 330 and not for 329. Using certain algorithm it converts the received command, control and data signals from the arbiter 308 to slave specific commands and controls that will allow it to manage the targeted slave device 330.
From set 300 of
Request 401 represents the bus request signal 313 of the bus master 301. Here a data transfer is to be performed using the bus 311 from bus master 301 to a slave device of the slaves 329. Request 402 represents the bus request signal 314 of the bus master 302. Here a data transfer is to be performed using the bus 311 from bus master 302 to a slave device of the slaves 329. Request 403 represents the bus request signal 315 of the bus master 303. Here a data transfer is to be performed using the bus 311 from bus master 303 to a slave device of the slaves 329.
Status 404 represents the status signal 310 of the arbiter 308 to the arbiter priority select 328. Here, the status denotes that the bus 311 driven by the arbiter 308 is in good condition.
From set 304 of
Request 405 represents the bus request signal 316 of the bus master 305. Here a data transfer is to be performed using the bus 312 from bus master 305 to a slave device of the slaves 330. Request 406 represents the bus request signal 317 of the bus master 306. Here a data transfer is to be performed using the bus 312 from bus master 306 to a slave device of the slaves 330.
Status 407 represents the status signal 310 of the arbiter 309 to the arbiter priority select 328. Here, the status denotes that the bus 312 driven by the arbiter 309 is damaged or unable to perform data transfer.
The priority 409 shown in the timing diagram in
Grant 410 and grant 413 represent bus grant signals 318 and 324 that are respectively output to the bus masters 303 and 305 by the arbiter 308 and 309.
Busrequest 411 represents the busrequest signal 321 of the arbiter 309 indicating that it is requesting to access bus 311 due to its failed bus 312. The busgrant 412 signal represents the busgrant signal 323 of the arbiter 308 to arbiter 309 indicating that it allows the bus master from set 304 to utilize bus 311.
It is assumed that in set 300, bus master 303 has the highest priority among the other two bus master. In set 304, it is assumed that the priority of the bus master 305 is higher than that of the bus master 306.
At clock signal clk 400 number 414 arbiter 309 detects that the bus 312 is damaged, sending a “damaged” status to arbiter priority select 328. Bus 311 remains to be in good condition causing the arbiter 308 to send “bus good condition” status to arbiter priority select 328.
Each of the bus master 301, 302 and 303 are requesting for the same bus 311. The request signal is triggered at clock signal clk 400 number 415. Similarly bus master 305 and 306 asserted their request for bus 312 at clock signal clk 400 number 415.
At clock signal clk 400, number 416, the priority of the bus master 303 is the highest among the other two bus masters from set 300 and the bus requested by the bus master 303 is bus 311 which is in good condition. Thus, arbiter 308 outputs a bus grant signal grant 410 corresponding to the priority 409 “set 300” of the arbiter priority select 328.
In one embodiment of the present invention, the request signal 403 de-asserts at clock signal clk 400 number 417 after receiving a the grant 410. Note that the grant 410 de-asserts at clock signal clk 400 number 418; here it indicates that the bus transaction or the data transfer executed by the bus master 303 is completed. Improvement was made when the priority signal 322 from arbiter priority select 328 represented by priority 409 shifts its prioritization at clock signal clk 400 number 420 after the bus transaction is completed. This will allow the bus master 303 to continuously perform data transfer without interruption from an external high priority request.
Concurrently, at clock signal clk 400, number 416, arbiter 309 has awarded bus master 305 of the highest priority to access bus 312, however bus 312 is inaccessible. In lieu of this event, arbiter 309 asserts the bus request signal busrequest 411 to arbiter 308 redirecting the request to bus 311 through arbiter 308.
Notice that at the time the busrequest 411 is asserted, the priority 409 transmitted by the arbiter priority select 328 points to set 300. This indicates that the bus transaction (data transfer) conducted by bus master 303 of set 300 is not yet completed and the priority of the operation remains to set 300.
At clock signal clk 400 number 421 the bus master 303 has completed its bus transaction. Arbiter 308 detected a change in the priority signal priority 409 that shifted from set 300 to set 304. At the same time, it is also receiving a bus request signal busrequest 411.
In response to the busrequest 411 sent by the arbiter 309 and with the priority signal priority 409 pointing to set 304, the arbiter 308 grants the request by sending bus grant signal busgrant 412.
Upon receiving bus grant signal busgrant 412, arbiter 309 reflects the grant signal grant 413 at clock signal clk 400 number 422 to the selected bus master with the highest priority from set 304 which is bus master 305.
It is assumed that at clock signal clk 400 number 423, the data transfer of bus master 305 from set 304 using bus 311 has completed resulting a shift in priority.
First, in system initialization step 500, selection and configuration of set 300 is made. Set 300 which is attached to arbiter 308 driving buses 311 is configured to form a cluster and is attached to a central arbiter priority select 328 with set 304 through arbiter 309. Bus 311 is provided with a unique bus identifier that is communicated to the arbiter priority select 328. Detection of bus failure is essential in this step; the arbiter 308 simultaneously sends a status signal 310 to the arbiter priority select 328 indicating the health of bus 311. For the example shown in
In reference to the operation in
In the event that the priority signal is not pointing to set 300 but to set 304, and arbiter 308 sends a busgrant signal 323 to arbiter 309 allowing the bus master selected by arbiter 309 from set 304 to access bus 311.
First, in system initialization, selection and configuration of set 304 is made. Set 304 attached to arbiter 309 driving bus 312 is configured to form a cluster and is attached to a central arbiter priority select 328 with set 300 through arbiter 308. Bus 312 is provided with a unique bus identifier that is communicated to the arbiter priority select 328. Detection of bus failure is essential in this step; the arbiter 309 simultaneously sends a status signal 310 to the arbiter priority select 328 indicating the health of bus 312. For the example shown in
A start is made of the regular operation of the arbitration for bus access in set 304. Generally, it involves the request of bus masters 305, 306, and 307 to gain ownership of bus 312. In
In reference to the operation in
In
From
The bus re-routing scenario of the invention is similar to the algorithm of the failover mechanism except that the busses involved in the system 233 are all functioning and the bus(es) that are free of any transaction will be utilized by other requesting bus masters.
In the light of this discussion, the system 233 in
Shown in the figure are two sets (600 and 604) of bus masters. Bus masters from set 600 are in-active, meaning, none of the bus masters from the set 600 are requesting for bus 611 access. Meanwhile, bus masters from set 604 are asserting their request 630 signal line indicating that they are requesting to access bus 612 to transfer data, command and control signals to the intended slave device 627.
With both buses in good condition, the arbiters 608 and 609 are sending status information to the arbiter priority select 625 of the health of the buses 611 and 612 respectively using the status signal 621.
In one embodiment of the present invention wherein a bus is free due to inactive bus request from bus masters attached to it, the arbiter that grants the access to the bus can accept external bus request from foreign sets of bus masters that are attached to the arbiter priority select. Wherein for the figure shown, since arbiters 608 and 609 are configured to connect in one arbiter priority select 625, therefore arbiter 608 having the bus 611 attached to it as a free bus, can accept bus request from arbiter 609 to utilize the bus 611.
In the example shown below, receiving as input from bus masters 605, 606 and 607, arbiter 609 performs an arbitration method that selects the highest priority request among the bus masters requesting from set 604. The first part of arbitration resulted for the arbiter 609 to award bus master 607 as the highest priority. Arbiter 609 sends a grant signal 617 to bus master 607 indicating that it can now perform data transfer to slave(s) 627 using bus 612. Bus master 607 uses path 619 as its primary data and command/controls path. It should be noted that in the span of the data transfer of the bus master 607, the ownership of bus 612 remains with the bus master 607 until the bus transaction is complete.
The slave controller 628 which is attached to the buses 611 and 612 receives the command and control signals from the bus master 607. It converts the signals received into slave specific commands in order to take control of the intended slave devices. Using the bus identification code sent by the bus master 607 is read by the slave controller allowing it to direct the slave specific command and control signals together with the data information to the intended slave destination in slaves 627. Take note that the secondary path 620 is disregarded.
While bus master 607 is performing data transfer using bus 612, bus masters 605 and 606 continues to request 630 for bus access. Note in this example, the bus masters from set 600 remains in-active.
In the event that bus 612 in the possession of bus master 607 and that there are pending requests 630 from bus masters 605 and 606, arbiter 609 sends a busrequest 623 signal to arbiter 608. The busrequest signal 623 is an indication that there are active requests from set 604 that can not be serviced for the moment by the bus 612. The arbiter 609 performs a multi-level priority arbitration (hidden arbitration) that selects a second bus master with the highest priority from the set 604.
The arbiter priority select 625 receiving a status 622 signal from arbiter 608 that the bus 611 is free triggers priority signal 621 selecting which set (600 or 604) is to be serviced by bus 611. Note that if the status signal 622 of the arbiter 608 denotes a “free bus” it automatically indicates that there are active requests from bus masters in set 600.
Upon receiving the busrequest signal 623 from arbiter 609, the arbiter 608 checks the priority signal 621 from arbiter priority select 625. At this certain point in time, since the status signal 622 received by the arbiter priority select 625 from 608 is a free bus, the priority signal 621 will point to the other set requesting access to the bus 611 via arbiter 608 which in this case, the priority signal 621 points to the set 604.
The arbiter 608 will grant the request from arbiter 609 by sending a busgrant 624 signal. This busgrant 624 signal from arbiter 608 will be reflected to bus master 605 via arbiter 609.
Upon receiving the grant signal 628 from arbiter 609, bus master 605 performs a data transfer to the intended slave of slave devices 627 using the path 610. The arbiter 608 having granted the request of bus master 605 via arbiter 609 will process the bus transaction of bus master 605 by sending the data, command and control signals of the bus master 605 to the slave controller 628 using the bus 611.
Receiving the data, command and control signals include the bus identification code sent by the bus master 605. This identification code specifies the intended destination of the data, command and control information transmitted by the bus master 605. Since the information was re-routed due to inactive bus 611, the bus identification code will made it possible for the slave controller 628 to identify which slave devices (626 or 627) the information is for. For this example, the bus identification code will denote that the information sent is for the slave devices 627. Note that specific address of the slave device is also contained in the control signals.
Should there be a case that the bus masters from set 600 are requesting, that the busrequest signal 623 from arbiter 609 is asserted, the priority signal 621 will shift its priority from one arbiter to another allowing only one bus master from each set (600 or 604) to gain access of bus 611 at a time. In the same manner, when the busrequest signal 623 from arbiter 608 is asserted, the priority signal 621 from arbiter priority select 625 will shift from one arbiter to another allowing only one bus master from each set (600 or 604) to gain access of bus 612 at a time.
From set 600 of
Request 402 represents the bus request of the bus masters 601, 602 and 603. Here the request signal 702 is not active due to the fact that none of the bus masters from set 600 wishes to own the bus 611.
Status 703 represents the status signal 622 of the arbiter 608 to the arbiter priority select 625. Here, the status denotes that the bus 611 driven by the arbiter 608 is in good condition and is not used by any bus masters from set 600.
From set 604 of
Request 704 represents the bus request signal 630 of the bus master 605. Here a data transfer is to be performed using the bus 612 from bus master 605 to a slave device of the slaves 627. Request 705 represents the bus request signal 630 of the bus master 606. Here a data transfer is to be performed using the bus 612 from bus master 606 to a slave device of the slaves 627. Request 706 represents the bus request signal 630 of the bus master 607. Here a data transfer is to be performed using the bus 612 from bus master 607 to a slave device of the slaves 627.
Status 707 represents the status signal 622 of the arbiter 609 to the arbiter priority select 625. Here, the status denotes that the bus 612 driven by the arbiter 609 is in good condition.
The priority 708 shown in the timing diagram in
Grant 709 and grant 712 represent bus grant signals 617 and 628 that are respectively output to the bus masters 607 and 605 by the arbiter 609.
Busrequest 710 represents the busrequest signal 624 of the arbiter 609 indicating that it is requesting to access bus 611 for bus utilization. The busgrant 711 signal represents the busgrant signal 623 of the arbiter 608 to arbiter 609 indicating that it allows the bus master from set 604 to utilize bus 611.
It is assumed that in set 604, bus master 605 has the highest priority among the other two bus masters.
At clock signal clk 701 number 700 arbiter 608 detects that the bus 611 that the bus masters from set 600 are not active. With this, the arbiter 608 sends a status signal status 703 to arbiter priority select 625 that the bus 611 is free and not being used. Similarly, arbiter 609 sends a status signal status 707 indicating that the bus 612 is free.
However, at clock signal clk 701 number 713 arbiter 609 receives request signals request 704, 705 and 706 from bus masters 605, 606 and 607. Each of the bus masters are requesting for the same bus 612.
At clock signal clk 701, number 714, the priority of the bus master 607 is the highest among the other two bus masters from set 604 and the bus requested by the bus master is in good condition and free to use. Thus, arbiter 609 outputs a bus grant signal grant 709. In effect, at clock signal clk 701 number 715 arbiter 609 changes its status signal status 707 to an “in use” bus 612. At the same time, bus master 607 de-asserts the request signal request 704 after receiving the grant signal grant 709.
At clock signal clk 701 number 716, request signals from set 604 continues to assert, which results to arbiter 609 asserting a bus request signal busrequest 710. The signal is sent to arbiter 608 to service. At the time, arbiter priority select 625 detected that the status signal status 707 transmitted by arbiter 609 changed to “in use”, from its default/current value, the priority changes from the current value to the set 604. This denotes that since bus 604 is already in use, and that the status signal status 703 of arbiter 608 is “free bus” the priority is directed to the bus masters of set 604 that continuously request for a bus access.
With the priority in set 604, and that the bus masters are continuously requesting to access a bus, arbiter 608 sends a bus grant signal busgrant 711 to arbiter 609. the arbiter 608 will then change its status from “free bus” to “in use bus”. Upon receiving the signal, arbiter 609 sends a local grant signal grant 712 to the bus master with the second highest priority which in this case is the bus master 605.
First, in system initialization step xxx, selection and configuration of set 604 is made. Set 604 which is attached to arbiter 609 driving bus 612 is configured to form a cluster and is attached to a central arbiter priority select 625 with set 600 through arbiter 608. Bus 612 is provided with a unique bus identifier that is communicated to the arbiter priority select 625. Detection of bus failure is essential in this step; the arbiter 609 simultaneously sends a status signal 622 to the arbiter priority select 625 indicating the health of the bus 612. For the example shown in
In
Upon granting the bus master 605, arbiter 609 changes its status signal 622 from “free bus” to “in use bus”. This signaling denotes that the bus 612 is busy and can't be accessed by any bus master requesting from set 604 or set 600.
Assuming that for certain time, the operation repeats but this time, the bus 612 is in use. Once a busy bus is detected, and so as the congestion of bus request, bus re-routing is performed.
When the bus 612 is busy, the arbiter 609 sends a bus request signal busrequest 623 to arbiter 608 to requesting to access bus 611. From this step, the next procedure occurs in the operation of arbiter 608 shown in
Basing from
Since none of the bus master from set 600 is requesting to access bus 611, arbiter 608 allows the set 604 to utilize its bus, therefore it grants the request of arbiter 609 by sending busgrant 624. Upon receiving busgrant 624, arbiter 609 sends a local grant signal to the next bus master with the highest priority which is bus master 605.
The arbiter 607 changes its status signal 622 indicating that the bus 611 is currently in use. The status is sent to the arbiter priority select 625.
In the method, if bus 311 is not in good condition, the arbiter 308 sends status 310 to arbiter priority select 328 of the bus condition and arbiter 308 sends the request to arbiter 309 of busrequest 321 to access bus 312 and the method proceeds to block 501 in
In the method, if the arbiter 309 does not assert the busrequest 321, the arbiter 308 sends grant 318 granting the bus mater with the highest priority from set 300 and the method then ends.
After the arbiter 308 receives busrequest 321 from arbiter 309, then arbiter checks the priority 310 from arbiter priority select 328. If the priority select is set 300, then the arbiter 308 sends busgrant 323 to arbiter 309 granting the set 304. If the priority select is not set 300, then arbiter 308 sends grant 318 granting the bus master with the highest priority from set 300, and the method then ends.
In an embodiment of the invention as shown in
In one embodiment of the invention, the distributed bus 126 of
The serial flashbus 1114 and 1126 are connected based on a point-to-point flashbus topology that is described in, for example, commonly-owned and commonly-assigned U.S. patent application Ser. No. 14/217,161 which is hereby fully incorporated herein by reference.
A CPU 1229 is coupled to and communicates with the arbiters 1210 and 1211 instead of an arbiter priority selected 229 of
A CPU 1328 is coupled to and communicates with the arbiters 1308 and 1309 instead of an arbiter priority selected 328 of
A CPU 1425 is coupled to and communicates with the arbiters 1408 and 1409 instead of an arbiter priority selected 625 of
Components in
Ingress channels (e.g., flashbus) 1570, 1571, and 1572 are coupled to the bus masters 1501, 1502, and 1503, respectively, in set 1500, while ingress channels (e.g., flashbus) 1573, 1574, and 1575 are coupled to the bus masters 1505, 1506, and 1507, respectively, in set 1504. Egress channels (e.g., flashbus) 1508 and 1509 are coupled to the slave controller 1580 (via the arbiters 1510 and 1511, respectively) and are also coupled to the slave controller 1532. Similarly in
In another embodiment of the invention, all of buses shown in
The following features may be common components or concepts for all figures. An arbiter priority Select can also be a simple set of configuration registers with fixed or semi-fixed settings or a complex set of state machines or registers with fixed or semi-fixed setting. The values in the set of configuration registers determine the priority and/or failover operations between the bus 1508 and bus 1509. Hence multiple transactions may occur using these fixed settings. For example, if flashbus 1509 goes down or fails, an arbiter priority select 1520 can be set permanently to move all bus transactions to 1508 instead. The Arbiter Priority Select 1529 may or may not be set on-the-fly depending on the method of setting the arbiter Priority Select, and the time to failover to the surviving bus (bus 1508 in this example) and to shut down the failing bus (bus 1509 in this example) may depend on how fast the register setting in the arbiter priority select 1529 are reconfigured. Hence a delay amounting to multiple transaction durations may occur prior to the arbiter Priority Select being set.
Likewise, if the CPU 1520 takes the role of the Arbiter Priority Select, depending on the speed of the CPU, the algorithms within and the physical embodiment of communication link 1528, any updated settings may or may not be set on-the-fly. Hence a delay amounting to multiple transaction durations may occur prior to the CPU 1520 indicating the priority to the Arbiters 1510 and 1511.
Foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless.
It is also within the scope of the present invention to implement a program or code that can be stored in a non-transient machine-readable (or non-transient computer-readable medium) having stored thereon instructions that permit a method (or that permit a computer) to perform any of the inventive techniques described above, or a program or code that can be stored in an article of manufacture that includes a non-transient computer readable medium on which computer-readable instructions for carrying out embodiments of the inventive techniques are stored. Other variations and modifications of the above-described embodiments and methods are possible in light of the teaching discussed herein.
The above description of illustrated embodiments of the invention, including what is described in the Abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize.
These modifications can be made to the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification and the claims. Rather, the scope of the invention is to be determined entirely by the following claims, which are to be construed in accordance with established doctrines of claim interpretation.
This application claims the benefit of and priority to U.S. Provisional Application 61/980,569, filed 17 Apr. 2014. This U.S. Provisional Application 61/980,569 is hereby fully incorporated herein by reference. This application is a continuation in part of U.S. application Ser. No. 14/216,627, entitled BUS ARBITRATION WITH ROUTING AND FAILOVER MECHANISM, which claims the benefit of and priority to U.S. Provisional Application 61/789,644, filed 15 Mar. 2013. This U.S. Provisional Application 61/789,644 and U.S. application Ser. No. 14/216,627 are hereby fully incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4402040 | Evett | Aug 1983 | A |
4752871 | Sparks | Jun 1988 | A |
4967344 | Scavezze et al. | Oct 1990 | A |
5111058 | Martin | May 1992 | A |
5136498 | McLaughlin | Aug 1992 | A |
RE34100 | Hartness | Oct 1992 | E |
5222046 | Kreifels et al. | Jun 1993 | A |
5297148 | Harari et al. | Mar 1994 | A |
5339404 | Vandling, III | Aug 1994 | A |
5341339 | Wells | Aug 1994 | A |
5371709 | Fisher et al. | Dec 1994 | A |
5379401 | Robinson et al. | Jan 1995 | A |
5388083 | Assar et al. | Feb 1995 | A |
5396468 | Harari et al. | Mar 1995 | A |
5406529 | Asano | Apr 1995 | A |
5432748 | Hsu et al. | Jul 1995 | A |
5448577 | Wells et al. | Sep 1995 | A |
5459850 | Clay et al. | Oct 1995 | A |
5479638 | Assar et al. | Dec 1995 | A |
5485595 | Assar et al. | Jan 1996 | A |
5488711 | Hewitt et al. | Jan 1996 | A |
5500826 | Hsu et al. | Mar 1996 | A |
5509134 | Fandrich et al. | Apr 1996 | A |
5513138 | Manabe et al. | Apr 1996 | A |
5524231 | Brown | Jun 1996 | A |
5530828 | Kaki et al. | Jun 1996 | A |
5535328 | Harari et al. | Jul 1996 | A |
5535356 | Kim et al. | Jul 1996 | A |
5542042 | Manson | Jul 1996 | A |
5542082 | Solhjell | Jul 1996 | A |
5548741 | Watanabe | Aug 1996 | A |
5559956 | Sukegawa | Sep 1996 | A |
5568423 | Jou et al. | Oct 1996 | A |
5568439 | Harari | Oct 1996 | A |
5572466 | Sukegawa | Nov 1996 | A |
5594883 | Pricer | Jan 1997 | A |
5602987 | Harari et al. | Feb 1997 | A |
5603001 | Sukegawa et al. | Feb 1997 | A |
5606529 | Honma et al. | Feb 1997 | A |
5606532 | Lambrache et al. | Feb 1997 | A |
5619470 | Fukumoto | Apr 1997 | A |
5627783 | Miyauchi | May 1997 | A |
5640349 | Kakinuma et al. | Jun 1997 | A |
5644784 | Peek | Jul 1997 | A |
5682509 | Kabenjian | Oct 1997 | A |
5737742 | Achiwa et al. | Apr 1998 | A |
5787466 | Berliner | Jul 1998 | A |
5796182 | Martin | Aug 1998 | A |
5799200 | Brant et al. | Aug 1998 | A |
5802554 | Caceres et al. | Sep 1998 | A |
5819307 | Iwamoto et al. | Oct 1998 | A |
5822251 | Bruce et al. | Oct 1998 | A |
5864653 | Tavallaei et al. | Jan 1999 | A |
5875351 | Riley | Feb 1999 | A |
5881264 | Kurosawa | Mar 1999 | A |
5913215 | Rubinstein et al. | Jun 1999 | A |
5918033 | Heeb et al. | Jun 1999 | A |
5933849 | Srbljic et al. | Aug 1999 | A |
5943421 | Grabon | Aug 1999 | A |
5956743 | Bruce et al. | Sep 1999 | A |
5987621 | Duso | Nov 1999 | A |
6000006 | Bruce et al. | Dec 1999 | A |
6014709 | Gulick et al. | Jan 2000 | A |
6076137 | Asnaashari | Jun 2000 | A |
6098119 | Surugucchi et al. | Aug 2000 | A |
6128303 | Bergantino | Oct 2000 | A |
6138200 | Ogilvie | Oct 2000 | A |
6138247 | McKay et al. | Oct 2000 | A |
6215875 | Nohda | Apr 2001 | B1 |
6230269 | Spies et al. | May 2001 | B1 |
6298071 | Taylor et al. | Oct 2001 | B1 |
6363441 | Beniz et al. | Mar 2002 | B1 |
6363444 | Platko et al. | Mar 2002 | B1 |
6397267 | Chong, Jr. | May 2002 | B1 |
6404772 | Beach et al. | Jun 2002 | B1 |
6496939 | Portman et al. | Dec 2002 | B2 |
6526506 | Lewis | Feb 2003 | B1 |
6529416 | Bruce et al. | Mar 2003 | B2 |
6539451 | Zani | Mar 2003 | B1 |
6557095 | Henstrom | Apr 2003 | B1 |
6574142 | Gelke | Jun 2003 | B2 |
6678754 | Soulier | Jan 2004 | B1 |
6744635 | Portman et al. | Jun 2004 | B2 |
6757845 | Bruce | Dec 2004 | B2 |
6857076 | Klein | Feb 2005 | B1 |
6901499 | Aasheim et al. | May 2005 | B2 |
6922391 | King et al. | Jul 2005 | B1 |
6961805 | Lakhani et al. | Nov 2005 | B2 |
6970446 | Krischar et al. | Nov 2005 | B2 |
6970890 | Bruce et al. | Nov 2005 | B1 |
6973546 | Johnson | Dec 2005 | B2 |
6980795 | Hermann et al. | Dec 2005 | B1 |
6999411 | Brewer | Feb 2006 | B1 |
7103684 | Chen et al. | Sep 2006 | B2 |
7174438 | Homma et al. | Feb 2007 | B2 |
7194766 | Noehring et al. | Mar 2007 | B2 |
7263006 | Aritome | Aug 2007 | B2 |
7283629 | Kaler et al. | Oct 2007 | B2 |
7305548 | Pierce et al. | Dec 2007 | B2 |
7330954 | Nangle | Feb 2008 | B2 |
7372962 | Fujimoto et al. | Jun 2008 | B2 |
7386662 | Kekre et al. | Jun 2008 | B1 |
7415549 | Vemula et al. | Aug 2008 | B2 |
7424553 | Borrelli et al. | Sep 2008 | B1 |
7430650 | Ross | Sep 2008 | B1 |
7490177 | Kao | Feb 2009 | B2 |
7500063 | Zohar et al. | Mar 2009 | B2 |
7506098 | Arcedera et al. | Mar 2009 | B2 |
7613876 | Bruce et al. | Nov 2009 | B2 |
7620748 | Bruce et al. | Nov 2009 | B1 |
7624239 | Bennett et al. | Nov 2009 | B2 |
7636801 | Kekre et al. | Dec 2009 | B1 |
7660941 | Lee et al. | Feb 2010 | B2 |
7676640 | Chow | Mar 2010 | B2 |
7681188 | Tirumalai et al. | Mar 2010 | B1 |
7716389 | Bruce et al. | May 2010 | B1 |
7743202 | Tsai et al. | Jun 2010 | B2 |
7765359 | Kang et al. | Jul 2010 | B2 |
7877639 | Hoang | Jan 2011 | B2 |
7913073 | Choi | Mar 2011 | B2 |
7921237 | Holland et al. | Apr 2011 | B1 |
7934052 | Prins et al. | Apr 2011 | B2 |
8010740 | Arcedera et al. | Oct 2011 | B2 |
8032700 | Bruce et al. | Oct 2011 | B2 |
8156320 | Borras | Apr 2012 | B2 |
8161223 | Chamseddine et al. | Apr 2012 | B1 |
8165301 | Bruce et al. | Apr 2012 | B1 |
8200879 | Falik et al. | Jun 2012 | B1 |
8341300 | Karamcheti | Dec 2012 | B1 |
8341311 | Szewerenko et al. | Dec 2012 | B1 |
8375257 | Hong et al. | Feb 2013 | B2 |
8447908 | Bruce et al. | May 2013 | B2 |
8489914 | Cagno | Jul 2013 | B2 |
8510631 | Wu et al. | Aug 2013 | B2 |
8560804 | Bruce et al. | Oct 2013 | B2 |
8707134 | Takahashi et al. | Apr 2014 | B2 |
8713417 | Jo | Apr 2014 | B2 |
8788725 | Bruce et al. | Jul 2014 | B2 |
8959307 | Bruce et al. | Feb 2015 | B1 |
9043669 | Bruce et al. | May 2015 | B1 |
9099187 | Bruce et al. | Aug 2015 | B2 |
9135190 | Bruce et al. | Sep 2015 | B1 |
9147500 | Kim et al. | Sep 2015 | B2 |
9201790 | Keeler | Dec 2015 | B2 |
9460042 | Iskandar | Oct 2016 | B2 |
20010010066 | Chin et al. | Jul 2001 | A1 |
20020011607 | Gelke | Jan 2002 | A1 |
20020013880 | Gappisch | Jan 2002 | A1 |
20020044486 | Chan et al. | Apr 2002 | A1 |
20020073324 | Hsu et al. | Jun 2002 | A1 |
20020083262 | Fukuzumi | Jun 2002 | A1 |
20020083264 | Coulson | Jun 2002 | A1 |
20020141244 | Bruce et al. | Oct 2002 | A1 |
20030023817 | Rowlands et al. | Jan 2003 | A1 |
20030065836 | Pecone | Apr 2003 | A1 |
20030097248 | Terashima et al. | May 2003 | A1 |
20030120864 | Lee et al. | Jun 2003 | A1 |
20030131201 | Khare et al. | Jul 2003 | A1 |
20030163624 | Matsui et al. | Aug 2003 | A1 |
20030163647 | Cameron et al. | Aug 2003 | A1 |
20030163649 | Kapur et al. | Aug 2003 | A1 |
20030182576 | Morlang et al. | Sep 2003 | A1 |
20030204675 | Dover et al. | Oct 2003 | A1 |
20030223585 | Tardo et al. | Dec 2003 | A1 |
20040073721 | Goff et al. | Apr 2004 | A1 |
20040078632 | Infante | Apr 2004 | A1 |
20040128553 | Buer et al. | Jul 2004 | A1 |
20040223503 | Lynch | Nov 2004 | A1 |
20050050245 | Miller et al. | Mar 2005 | A1 |
20050055481 | Chou | Mar 2005 | A1 |
20050102456 | Kang | May 2005 | A1 |
20050120146 | Chen et al. | Jun 2005 | A1 |
20050210149 | Kimball | Sep 2005 | A1 |
20050240707 | Hayashi et al. | Oct 2005 | A1 |
20050243610 | Guha et al. | Nov 2005 | A1 |
20050289361 | Sutardja | Dec 2005 | A1 |
20060004957 | Hand, III et al. | Jan 2006 | A1 |
20060026329 | Yu | Feb 2006 | A1 |
20060031450 | Unrau et al. | Feb 2006 | A1 |
20060095709 | Achiwa | May 2006 | A1 |
20060112251 | Karr et al. | May 2006 | A1 |
20060184723 | Sinclair et al. | Aug 2006 | A1 |
20070019573 | Nishimura | Jan 2007 | A1 |
20070028040 | Sinclair | Feb 2007 | A1 |
20070058478 | Murayama | Mar 2007 | A1 |
20070073922 | Go et al. | Mar 2007 | A1 |
20070083680 | King et al. | Apr 2007 | A1 |
20070088864 | Foster | Apr 2007 | A1 |
20070094450 | VanderWiel | Apr 2007 | A1 |
20070096785 | Maeda | May 2007 | A1 |
20070121499 | Pal et al. | May 2007 | A1 |
20070130439 | Andersson et al. | Jun 2007 | A1 |
20070159885 | Gorobets | Jul 2007 | A1 |
20070168754 | Zohar et al. | Jul 2007 | A1 |
20070174493 | Irish et al. | Jul 2007 | A1 |
20070174506 | Tsuruta | Jul 2007 | A1 |
20070195957 | Arulambalam et al. | Aug 2007 | A1 |
20070288686 | Arcedera et al. | Dec 2007 | A1 |
20070288692 | Bruce et al. | Dec 2007 | A1 |
20080052456 | Ash et al. | Feb 2008 | A1 |
20080052585 | LaBerge et al. | Feb 2008 | A1 |
20080072031 | Choi | Mar 2008 | A1 |
20080147963 | Tsai et al. | Jun 2008 | A1 |
20080189466 | Hemmi | Aug 2008 | A1 |
20080218230 | Shim | Sep 2008 | A1 |
20080228959 | Wang | Sep 2008 | A1 |
20090055573 | Ito | Feb 2009 | A1 |
20090077306 | Arcedera et al. | Mar 2009 | A1 |
20090083022 | Bin Mohd Nordin et al. | Mar 2009 | A1 |
20090094411 | Que | Apr 2009 | A1 |
20090158085 | Kern et al. | Jun 2009 | A1 |
20090172250 | Allen et al. | Jul 2009 | A1 |
20090172466 | Royer et al. | Jul 2009 | A1 |
20090240873 | Yu et al. | Sep 2009 | A1 |
20100058045 | Borras et al. | Mar 2010 | A1 |
20100095053 | Bruce et al. | Apr 2010 | A1 |
20100125695 | Wu et al. | May 2010 | A1 |
20100250806 | Devilla et al. | Sep 2010 | A1 |
20100318706 | Kobayashi | Dec 2010 | A1 |
20110022778 | Schibilla et al. | Jan 2011 | A1 |
20110022801 | Flynn | Jan 2011 | A1 |
20110087833 | Jones | Apr 2011 | A1 |
20110093648 | Belluomini et al. | Apr 2011 | A1 |
20110113186 | Bruce et al. | May 2011 | A1 |
20110145479 | Talagala et al. | Jun 2011 | A1 |
20110161568 | Bruce et al. | Jun 2011 | A1 |
20110167204 | Estakhri et al. | Jul 2011 | A1 |
20110197011 | Suzuki et al. | Aug 2011 | A1 |
20110202709 | Rychlik | Aug 2011 | A1 |
20110258405 | Asaki et al. | Oct 2011 | A1 |
20110264884 | Kim | Oct 2011 | A1 |
20110264949 | Ikeuchi et al. | Oct 2011 | A1 |
20110270979 | Schlansker et al. | Nov 2011 | A1 |
20120005405 | Wu et al. | Jan 2012 | A1 |
20120005410 | Ikeuchi | Jan 2012 | A1 |
20120017037 | Riddle et al. | Jan 2012 | A1 |
20120102263 | Aswadhati | Apr 2012 | A1 |
20120102268 | Smith et al. | Apr 2012 | A1 |
20120137050 | Wang et al. | May 2012 | A1 |
20120215973 | Cagno | Aug 2012 | A1 |
20120271967 | Hirschman | Oct 2012 | A1 |
20120311197 | Larson et al. | Dec 2012 | A1 |
20130094312 | Jang et al. | Apr 2013 | A1 |
20130099838 | Kim et al. | Apr 2013 | A1 |
20130111135 | Bell, Jr. et al. | May 2013 | A1 |
20130208546 | Kim et al. | Aug 2013 | A1 |
20130212337 | Maruyama | Aug 2013 | A1 |
20130212349 | Maruyama | Aug 2013 | A1 |
20130246694 | Bruce et al. | Sep 2013 | A1 |
20130262750 | Yamasaki et al. | Oct 2013 | A1 |
20130282933 | Jokinen et al. | Oct 2013 | A1 |
20130304775 | Davis et al. | Nov 2013 | A1 |
20130339578 | Ohya et al. | Dec 2013 | A1 |
20130339582 | Olbrich et al. | Dec 2013 | A1 |
20130346672 | Sengupta et al. | Dec 2013 | A1 |
20140095803 | Kim et al. | Apr 2014 | A1 |
20140104949 | Bruce et al. | Apr 2014 | A1 |
20140108869 | Brewerton et al. | Apr 2014 | A1 |
20140189203 | Suzuki et al. | Jul 2014 | A1 |
20140258788 | Maruyama | Sep 2014 | A1 |
20140285211 | Raffinan | Sep 2014 | A1 |
20140331034 | Ponce et al. | Nov 2014 | A1 |
20150006766 | Ponce et al. | Jan 2015 | A1 |
20150012690 | Bruce et al. | Jan 2015 | A1 |
20150032937 | Salessi | Jan 2015 | A1 |
20150032938 | Salessi | Jan 2015 | A1 |
20150067243 | Salessi et al. | Mar 2015 | A1 |
20150149697 | Salessi et al. | May 2015 | A1 |
20150149706 | Salessi et al. | May 2015 | A1 |
20150153962 | Salessi et al. | Jun 2015 | A1 |
20150169021 | Salessi et al. | Jun 2015 | A1 |
20150261456 | Alcantara et al. | Sep 2015 | A1 |
20150261475 | Alcantara et al. | Sep 2015 | A1 |
20150261797 | Alcantara et al. | Sep 2015 | A1 |
20150370670 | Lu | Dec 2015 | A1 |
20150371684 | Mataya | Dec 2015 | A1 |
20150378932 | Souri et al. | Dec 2015 | A1 |
20160026402 | Alcantara et al. | Jan 2016 | A1 |
20160027521 | Lu | Jan 2016 | A1 |
20160041596 | Alcantara et al. | Feb 2016 | A1 |
Number | Date | Country |
---|---|---|
103401696 | Nov 2013 | CN |
2005142859 | Jun 2005 | JP |
2005-309847 | Nov 2005 | JP |
489308 | Jun 2002 | TW |
200428219 | Dec 2004 | TW |
436689 | Dec 2005 | TW |
I420316 | Dec 2013 | TW |
WO 9406210 | Mar 1994 | WO |
WO 9838568 | Sep 1998 | WO |
Entry |
---|
‘Amazon Route 53 Developer Guide’ API Version Apr. 1, 2013, copyright 2017 by Amazon Web Services. |
‘Host Bus Adapters (HBAs): What you need to know about a storage networking workhorse’ by Alan Earls, Feb. 2003. |
Office Action dated Sep. 11, 2015 for U.S. Appl. No. 14/217,436. |
Office Action dated Sep. 24, 2015 for U.S. Appl. No. 14/217,334. |
Office Action dated Sep. 18, 2015 for Taiwanese Patent Application No. 102144165. |
Office Action dated Sep. 29, 2015 for U.S. Appl. No. 14/217,316. |
Office Action dated Sep. 28, 2015 for U.S. Appl. No. 14/689,045. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,041 dated Apr. 11, 2016. |
National Science Fountation,Award Abstract #1548968, SBIR Phase I: SSD In-Situ Processing, http://www.nsf.gov/awardsearch/showAward?AWD—ID=1548968 printed on Feb. 13, 2016. |
Design-Reuse, NxGn Data Emerges from Stealth Mode to provide a paradigm shift in enterprise storage solution (author(s) not indicated), Jul. 31, 2014. |
http://www.design-reuse.com/news/35111/nxgn-data-intelligent-solutions.html, printed on Feb. 13, 2016 (author(s) not indicated). |
Office Action for U.S. Appl. No. 13/475,878, dated Jun. 23, 2014. |
Office Action for U.S. Appl. No. 13/253,912 dated Jul. 16, 2014. |
Office Action for U.S. Appl. No. 12/876,113 dated Jul. 11, 2014. |
Office Action for U.S. Appl. No. 12/270,626 dated Feb. 3, 2012. |
Office Action for U.S. Appl. No. 12/270,626 dated Apr. 4, 2011. |
Office Action for U.S. Appl. No. 12/270,626 dated Mar. 15, 2013. |
Notice of Allowance/Allowability for U.S. Appl. No. 12/270,626 dated Oct. 3, 2014. |
Advisory Action for U.S. Appl. No. 12/876,113 dated Oct. 16, 2014. |
Office Action for U.S. Appl. No. 14/297,628 dated Jul. 17, 2015. |
Office Action for U.S. Appl. No. 13/475,878 dated Dec. 4, 2014. |
Office Action dated Oct. 5, 2015 for Taiwanese Application No. 103105076. |
Office Action dated Nov. 19, 2015 for U.S. Appl. No. 14/217,249. |
Office Action dated Nov. 18, 2015 for U.S. Appl. No. 14/217,467. |
Office Action dated Dec. 4, 2015 for U.S. Appl. No. 14/616,700. |
Office Action dated Jun. 4, 2015 for U.S. Appl. No. 14/215,414. |
Office Action for U.S. Appl. No. 13/475,878 dated Jun. 23, 2014. |
Office Action for U.S. Appl. No. 12/876,113 dated Oct. 16, 2014. |
Notice of Allowance for U.S. Appl. No. 12/270,626 dated Oct. 3, 2014. |
Office Action for U.S. Appl. No. 12/270,626 dated May 23, 2014. |
Office Action for U.S. Appl. No. 12/270,626 dated Dec. 18, 2013. |
Office Action for U.S. Appl. No. 12/270,626 dated Aug. 23, 2012. |
Office Action dated Oct. 8, 2015 for U.S. Appl. No. 14/217,291. |
Final Office Action dated Nov. 19, 2015 for U.S. Appl. No. 14/217,249. |
Final Office Action dated Nov. 18, 2015 for U.S. Appl. No. 14/217,467. |
Office Action dated Nov. 25, 2015 for U.S. Appl. No. 14/217,041. |
Notice of Allowance/Allowability for U.S. Appl. No. 13/890,229 dated Feb. 20, 2014. |
Office Action for U.S. Appl. No. 13/890,229 dated Oct. 8, 2013. |
Office Action for U.S. Appl. No. 12/876,113 dated Dec. 5, 2014. |
Notice of Allowance/Allowabilty for U.S. Appl. No. 12/876,113 dated Jun. 22, 2015. |
Office Action for U.S. Appl. No. 14/217,249 dated Apr. 23, 2015. |
Office Action for U.S. Appl. No. 14/217,467 dated Apr. 27, 2015. |
Office Action for U.S. Appl. No. 14/616,700 dated Apr. 30, 2015. |
Office Action for U.S. Appl. No. 14/217,436 dated Sep. 11, 2015. |
Office Action for U.S. Appl. No. 12/876,113 dated Mar. 13, 2014. |
Advisory Action for U.S. Appl. No. 12/876,113 dated Sep. 6, 2013. |
Office Action for U.S. Appl. No. 12/876,113 dated May 14, 2013. |
Office Action for U.S. Appl. No. 12/876,113 dated Dec. 21, 2012. |
William Stallings, Security Comes to SNMP: The New SNMPv3 Proposed Internet Standard, The Internet Protocol Journal, vol. 1, No. 3, Dec. 1998. |
Notice of Allowability for U.S. Appl. No. 12/882,059 dated May 30, 2013. |
Notice of Allowability for U.S. Appl. No. 12/882,059 dated Feb. 14, 2013. |
Office Action for U.S. Appl. No. 12/882,059 dated May 11, 2012. |
Notice of Allowability for U.S. Appl. No. 14/038,684 dated Aug. 1, 2014. |
Office Action for U.S. Appl. No. 14/038,684 dated Mar. 17, 2014. |
Office Action for U.S. Appl. No. 14/217,249 dated Apr. 21, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,467 dated Apr. 20, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/214,216 dated Apr. 27, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,436 dated May 6, 2016. |
USPTO Notice of Allowability & attachment(s) dated Jan. 7, 2013 for U.S. Appl. No. 12/876,247. |
Office Action dated Sep. 14, 2012 for U.S. Appl. No. 12/876,247. |
Office Action dated Feb. 1, 2012 for U.S. Appl. No. 12/876,247. |
Notice of Allowance/Allowability dated Mar. 31, 2015 for U.S. Appl. No. 13/475,878. |
Office Action dated May 22, 2015 for U.S. Appl. No. 13/253,912. |
Office Action for U.S. Appl. No. 14/217,365 dated Feb. 18, 2016. |
Office Action for U.S. Appl. No. 14/217,365 dated Mar. 2, 2016. |
Office Action for U.S. Appl. No. 14/690,305 dated Feb. 25, 2016. |
Office Action for U.S. Appl. No. 14/217,436 dated Feb. 25, 2016. |
Office Action for U.S. Appl. No. 14/217,316 dated Feb. 26, 2016. |
Office Action for U.S. Appl. No. 14/215,414 dated Mar. 1, 2016. |
Office Action for U.S. Appl. No. 14/616,700 dated Mar. 8, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 13/253,912 dated Mar. 21, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/803,107 dated Mar. 28, 2016. |
Office Action for U.S. Appl. No. 14/217,334 dated Apr. 4, 2016. |
Office Action dated Dec. 15, 2015 for U.S. Appl. No. 13/253,912. |
Office Action dated Dec. 17, 2015 for U.S. Appl. No. 14/214,216. |
Office Action dated Dec. 17, 2015 for U.S. Appl. No. 14/215,414. |
Office Action dated Dec. 17, 2015 for U.S. Appl. No. 14/803,107. |
Office Action dated Jan. 15, 2016 for U.S. Appl. No. 14/866,946. |
Office Action dated Jan. 11, 2016 for U.S. Appl. No. 14/217,399. |
Office Action dated Jan. 15, 2016 for U.S. Appl. No. 14/216,937. |
Notice of Allowance and Examiner-Initiated Interview Summary, dated Jan. 29, 2016 for U.S. Appl. No. 14/297,628. |
Office Action dated Dec. 5, 2014 for U.S. Appl. No. 14/038,684. |
Notice of allowance/allowability for U.S. Appl. No. 14/216,627 dated Jun. 15, 2017. |
Notice of allowance/allowability for U.S. Appl. No. 14/216,627 dated Mar. 1, 2017. |
Office Action for U.S. Appl. No. 14/216,627 dated Nov. 7, 2016. |
Number | Date | Country | |
---|---|---|---|
61980569 | Apr 2014 | US | |
61789644 | Mar 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14216627 | Mar 2014 | US |
Child | 14688209 | US |